Lookup for vulnerable packages by Package URL.

GET /api/packages/87564?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/87564?format=api",
    "purl": "pkg:rpm/redhat/kernel@5.14.0-362.8.1?arch=el9_3",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel",
    "version": "5.14.0-362.8.1",
    "qualifiers": {
        "arch": "el9_3"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65551?format=api",
            "vulnerability_id": "VCID-138j-qpva-83g6",
            "summary": "kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54015.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54015.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54015"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424936",
                    "reference_id": "2424936",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424936"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54015"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-138j-qpva-83g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65356?format=api",
            "vulnerability_id": "VCID-1c14-gjcb-yfaa",
            "summary": "kernel: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54202.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54202.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54202"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54202"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426132",
                    "reference_id": "2426132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54202"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1c14-gjcb-yfaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67953?format=api",
            "vulnerability_id": "VCID-1h1a-a6zz-fycq",
            "summary": "kernel: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50247.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50247.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04278",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04236",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50247"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395393",
                    "reference_id": "2395393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50247"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1h1a-a6zz-fycq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67019?format=api",
            "vulnerability_id": "VCID-1jj7-u9b2-93g6",
            "summary": "kernel: bpf, arm64: Fixed a BTI error on returning to patched function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53634"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402271",
                    "reference_id": "2402271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458",
                    "reference_id": "RHSA-2023:2458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53634"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jj7-u9b2-93g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78255?format=api",
            "vulnerability_id": "VCID-1k1q-rng8-nug2",
            "summary": "kernel: xfrm: out-of-bounds read of XFRMA_MTIMER_THRESH nlattr",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3773.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3773.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03501",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03483",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04263",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04265",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04249",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04194",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0433",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04346",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04366",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3773"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944",
                    "reference_id": "2218944",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:33:27Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218944"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-3773",
                    "reference_id": "CVE-2023-3773",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:33:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-3773"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T18:33:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6415-1/",
                    "reference_id": "USN-6415-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6415-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6534-1/",
                    "reference_id": "USN-6534-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6534-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6534-2/",
                    "reference_id": "USN-6534-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6534-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6534-3/",
                    "reference_id": "USN-6534-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6534-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6549-1/",
                    "reference_id": "USN-6549-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6549-2/",
                    "reference_id": "USN-6549-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6549-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6549-3/",
                    "reference_id": "USN-6549-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6549-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6549-4/",
                    "reference_id": "USN-6549-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6549-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6549-5/",
                    "reference_id": "USN-6549-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6549-5/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3773"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1k1q-rng8-nug2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69882?format=api",
            "vulnerability_id": "VCID-1kuj-tvuz-37a4",
            "summary": "kernel: net/mlx5e: Fix cleanup null-ptr deref on encap lock",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363776",
                    "reference_id": "2363776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363776"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53105"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1kuj-tvuz-37a4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65353?format=api",
            "vulnerability_id": "VCID-1pbx-w7ed-4be2",
            "summary": "kernel: Linux kernel: Memory leak in mt76 Wi-Fi driver leads to Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54191.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54191.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54191"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426129",
                    "reference_id": "2426129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54191"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pbx-w7ed-4be2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65792?format=api",
            "vulnerability_id": "VCID-1rxf-6vz4-j3ht",
            "summary": "kernel: Kernel: NULL pointer dereference in Intel GVT-g debugfs during device removal",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54098.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54098.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425180",
                    "reference_id": "2425180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54098"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rxf-6vz4-j3ht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67197?format=api",
            "vulnerability_id": "VCID-1sd7-kt5u-wkbw",
            "summary": "kernel: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53582.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53582.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53582"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401559",
                    "reference_id": "2401559",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401559"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53582"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1sd7-kt5u-wkbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71082?format=api",
            "vulnerability_id": "VCID-1tpw-wj2t-v7b4",
            "summary": "kernel: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01342",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01276",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01281",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01267",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01256",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01269",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01344",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01352",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01356",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01348",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10422",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1049",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49715"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347647",
                    "reference_id": "2347647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347647"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/506a88a5bf261d76a5214c0338a320f2214c67ac",
                    "reference_id": "506a88a5bf261d76a5214c0338a320f2214c67ac",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/506a88a5bf261d76a5214c0338a320f2214c67ac"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8d884c08eeb83142a7173cb46bcff0434ec42cf1",
                    "reference_id": "8d884c08eeb83142a7173cb46bcff0434ec42cf1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8d884c08eeb83142a7173cb46bcff0434ec42cf1"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c136c2924a59a399aa789858cfb320d481964fb7",
                    "reference_id": "c136c2924a59a399aa789858cfb320d481964fb7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c136c2924a59a399aa789858cfb320d481964fb7"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cc5984cf270b69d03f9f4b27063e535036c659e9",
                    "reference_id": "cc5984cf270b69d03f9f4b27063e535036c659e9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cc5984cf270b69d03f9f4b27063e535036c659e9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e824482e2c5edacc961b7dd30a92fd47606c3036",
                    "reference_id": "e824482e2c5edacc961b7dd30a92fd47606c3036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e824482e2c5edacc961b7dd30a92fd47606c3036"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fa1ad9d4cc47ca2470cd904ad4519f05d7e43a2b",
                    "reference_id": "fa1ad9d4cc47ca2470cd904ad4519f05d7e43a2b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fa1ad9d4cc47ca2470cd904ad4519f05d7e43a2b"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49715"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tpw-wj2t-v7b4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66123?format=api",
            "vulnerability_id": "VCID-1uk4-az78-6bd3",
            "summary": "kernel: cifs: Fix xid leak in cifs_copy_file_range()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50643.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50643.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06291",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50643"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50643"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420289",
                    "reference_id": "2420289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50643"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1uk4-az78-6bd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67286?format=api",
            "vulnerability_id": "VCID-1uu7-ktam-v7bz",
            "summary": "kernel: kernel: Denial of Service due to xid leak in cifs_flock()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50460.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50460.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50460"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50460"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400720",
                    "reference_id": "2400720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50460"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1uu7-ktam-v7bz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69186?format=api",
            "vulnerability_id": "VCID-1xuk-jx7k-5yf4",
            "summary": "kernel: xfrm: policy: fix metadata dst->dev xmit null pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06468",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0652",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50004"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373469",
                    "reference_id": "2373469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50004"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xuk-jx7k-5yf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66302?format=api",
            "vulnerability_id": "VCID-1y7x-beaw-6bdy",
            "summary": "kernel: regulator: core: Use different devices for resource allocation and DT lookup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419958",
                    "reference_id": "2419958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419958"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50616"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1y7x-beaw-6bdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67765?format=api",
            "vulnerability_id": "VCID-1yk5-p6v6-vkb7",
            "summary": "kernel: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53320.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53320.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01854",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01868",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02499",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02592",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02582",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02644",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02633",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0251",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02509",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02494",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53320"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395866",
                    "reference_id": "2395866",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395866"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2",
                    "reference_id": "2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8ba997b22f2cd5d29aad8c39f6201f7608ed0c04",
                    "reference_id": "8ba997b22f2cd5d29aad8c39f6201f7608ed0c04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8ba997b22f2cd5d29aad8c39f6201f7608ed0c04"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fb428a2005fc1260d18b989cc5199f281617f44d",
                    "reference_id": "fb428a2005fc1260d18b989cc5199f281617f44d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fb428a2005fc1260d18b989cc5199f281617f44d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53320"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yk5-p6v6-vkb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65694?format=api",
            "vulnerability_id": "VCID-24gs-ss6s-2ka7",
            "summary": "kernel: Kernel: Denial of Service due to memory leak in RAID10 functionality",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54123.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54123.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425082",
                    "reference_id": "2425082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54123"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24gs-ss6s-2ka7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67919?format=api",
            "vulnerability_id": "VCID-2bhz-r95r-xudm",
            "summary": "kernel: drm/radeon: Add the missed acpi_put_table() to fix memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50275.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50275.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50275"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50275"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395356",
                    "reference_id": "2395356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50275"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bhz-r95r-xudm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77897?format=api",
            "vulnerability_id": "VCID-2dcp-rju9-m7ce",
            "summary": "kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0443.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0443.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0231",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02296",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02288",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02333",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02305",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02238",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02243",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0224",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02242",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02263",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02235",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0443"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/",
                    "reference_id": "20221215033132.230023-3-longman@redhat.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257968",
                    "reference_id": "2257968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257968"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2024-0443",
                    "reference_id": "CVE-2024-0443",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2024-0443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2024-0443"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcp-rju9-m7ce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66181?format=api",
            "vulnerability_id": "VCID-2h8d-g1pd-9yge",
            "summary": "kernel: RDMA/rxe: Fix \"kernel NULL pointer dereference\" error",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12422",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19739",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19753",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19648",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420356",
                    "reference_id": "2420356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50671"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2h8d-g1pd-9yge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71516?format=api",
            "vulnerability_id": "VCID-2jsf-uca5-j3bh",
            "summary": "kernel: tpm: fix reference counting for struct tpm_chip",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49287.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49287.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06281",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05968",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06008",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0599",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05948",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06099",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06121",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06152",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06161",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0618",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27205",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27169",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49287"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49287"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348089",
                    "reference_id": "2348089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348089"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/290e05f346d1829e849662c97e42d5ad984f5258",
                    "reference_id": "290e05f346d1829e849662c97e42d5ad984f5258",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/290e05f346d1829e849662c97e42d5ad984f5258"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2f928c0d5c02dbab49e8c19d98725c822f6fc409",
                    "reference_id": "2f928c0d5c02dbab49e8c19d98725c822f6fc409",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2f928c0d5c02dbab49e8c19d98725c822f6fc409"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/473a66f99cb8173c14138c5a5c69bfad04e8f9ac",
                    "reference_id": "473a66f99cb8173c14138c5a5c69bfad04e8f9ac",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/473a66f99cb8173c14138c5a5c69bfad04e8f9ac"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/662893b4f6bd466ff9e1cd454c44c26d32d554fe",
                    "reference_id": "662893b4f6bd466ff9e1cd454c44c26d32d554fe",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/662893b4f6bd466ff9e1cd454c44c26d32d554fe"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6e7baf84149fb43950631415de231b3a41915aa3",
                    "reference_id": "6e7baf84149fb43950631415de231b3a41915aa3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6e7baf84149fb43950631415de231b3a41915aa3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7e0438f83dc769465ee663bb5dcf8cc154940712",
                    "reference_id": "7e0438f83dc769465ee663bb5dcf8cc154940712",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7e0438f83dc769465ee663bb5dcf8cc154940712"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a27ed2f3695baf15f9b34d2d7a1f9fc105539a81",
                    "reference_id": "a27ed2f3695baf15f9b34d2d7a1f9fc105539a81",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a27ed2f3695baf15f9b34d2d7a1f9fc105539a81"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cb64bd038beacb4331fe464a36c8b5481e8f51e2",
                    "reference_id": "cb64bd038beacb4331fe464a36c8b5481e8f51e2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cb64bd038beacb4331fe464a36c8b5481e8f51e2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49287"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jsf-uca5-j3bh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67539?format=api",
            "vulnerability_id": "VCID-2qkf-h5gz-eue4",
            "summary": "kernel: scsi: mpi3mr: Use number of bits to manage bitmap sizes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00737",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00746",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00745",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00733",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00728",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00936",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00941",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00945",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00938",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0094",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00935",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00879",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00887",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53376"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396429",
                    "reference_id": "2396429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396429"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/339e61565f81a6534afdc18fd854b2e2628bf5db",
                    "reference_id": "339e61565f81a6534afdc18fd854b2e2628bf5db",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/339e61565f81a6534afdc18fd854b2e2628bf5db"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6a675a6d57d31da43d8da576465c1cd5d5b0bd3d",
                    "reference_id": "6a675a6d57d31da43d8da576465c1cd5d5b0bd3d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6a675a6d57d31da43d8da576465c1cd5d5b0bd3d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8ac713d2e9845e9234bb12ae5903040685d5aff9",
                    "reference_id": "8ac713d2e9845e9234bb12ae5903040685d5aff9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8ac713d2e9845e9234bb12ae5903040685d5aff9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53376"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2qkf-h5gz-eue4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69997?format=api",
            "vulnerability_id": "VCID-2qu2-e42a-tfce",
            "summary": "kernel: scsi: scsi_transport_sas: Fix error handling in sas_phy_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12462",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1243",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12434",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12549",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12557",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12524",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1241",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12322",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12698",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1251",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12606",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49839"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/03aabcb88aeeb7221ddb6196ae84ad5fb17b743f",
                    "reference_id": "03aabcb88aeeb7221ddb6196ae84ad5fb17b743f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:01:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/03aabcb88aeeb7221ddb6196ae84ad5fb17b743f"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363370",
                    "reference_id": "2363370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363370"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2f21d653c648735657e23948b1d7ac7273de0f87",
                    "reference_id": "2f21d653c648735657e23948b1d7ac7273de0f87",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:01:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2f21d653c648735657e23948b1d7ac7273de0f87"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5d7bebf2dfb0dc97aac1fbace0910e557ecdb16f",
                    "reference_id": "5d7bebf2dfb0dc97aac1fbace0910e557ecdb16f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:01:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5d7bebf2dfb0dc97aac1fbace0910e557ecdb16f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c736876ee294bb4f271d76a25cc7d70c8537bc5d",
                    "reference_id": "c736876ee294bb4f271d76a25cc7d70c8537bc5d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:01:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c736876ee294bb4f271d76a25cc7d70c8537bc5d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49839"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2qu2-e42a-tfce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69343?format=api",
            "vulnerability_id": "VCID-2uss-f4qt-jyc1",
            "summary": "kernel: vfio: Split migration ops from main device ops",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50117.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50117.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0768",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07701",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0776",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07764",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07748",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21987",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50117"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373626",
                    "reference_id": "2373626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50117"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uss-f4qt-jyc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67548?format=api",
            "vulnerability_id": "VCID-2zmv-e7yv-1bg3",
            "summary": "kernel: drivers: base: component: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53409.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53409.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04057",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53409"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/09709a49283f79184c998d6dafcc01590e4d654d",
                    "reference_id": "09709a49283f79184c998d6dafcc01590e4d654d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/09709a49283f79184c998d6dafcc01590e4d654d"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396454",
                    "reference_id": "2396454",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396454"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/79ac2b01e033181e21cc84216ace1f4160eb8950",
                    "reference_id": "79ac2b01e033181e21cc84216ace1f4160eb8950",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/79ac2b01e033181e21cc84216ace1f4160eb8950"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8deb87b1e810dd558371e88ffd44339fbef27870",
                    "reference_id": "8deb87b1e810dd558371e88ffd44339fbef27870",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8deb87b1e810dd558371e88ffd44339fbef27870"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bf0fd01c7cc1061fb2cfda3e2044371642108e6c",
                    "reference_id": "bf0fd01c7cc1061fb2cfda3e2044371642108e6c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bf0fd01c7cc1061fb2cfda3e2044371642108e6c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53409"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zmv-e7yv-1bg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71139?format=api",
            "vulnerability_id": "VCID-31t8-r1qa-4qb4",
            "summary": "kernel: regulator: scmi: Fix refcount leak in scmi_regulator_probe",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10785",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34181",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34627",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34603",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34642",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34628",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34589",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34353",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34333",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34248",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34116",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34635",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34664",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34666",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49466"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347704",
                    "reference_id": "2347704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347704"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/299a002161c7bfb72e99ba45e5b660aecc344ea0",
                    "reference_id": "299a002161c7bfb72e99ba45e5b660aecc344ea0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:39:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/299a002161c7bfb72e99ba45e5b660aecc344ea0"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4a59c763ef9b68c711dc2fd2ef4a6648da5480ee",
                    "reference_id": "4a59c763ef9b68c711dc2fd2ef4a6648da5480ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:39:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4a59c763ef9b68c711dc2fd2ef4a6648da5480ee"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/68d6c8476fd4f448e70e0ab31ff972838ac41dae",
                    "reference_id": "68d6c8476fd4f448e70e0ab31ff972838ac41dae",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:39:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/68d6c8476fd4f448e70e0ab31ff972838ac41dae"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9ebbfa73d69909b7c737f599fd4ebd42318fc881",
                    "reference_id": "9ebbfa73d69909b7c737f599fd4ebd42318fc881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:39:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9ebbfa73d69909b7c737f599fd4ebd42318fc881"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49466"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31t8-r1qa-4qb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67309?format=api",
            "vulnerability_id": "VCID-36n9-2h67-qyfg",
            "summary": "kernel: gpiolib: cdev: fix NULL-pointer dereferences",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50453.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50453.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50453"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400743",
                    "reference_id": "2400743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50453"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36n9-2h67-qyfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67531?format=api",
            "vulnerability_id": "VCID-36pz-ffad-1fch",
            "summary": "kernel: mlx5: fix possible ptp queue fifo use-after-free",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53398.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53398.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01868",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02499",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02592",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02582",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02644",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02633",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02494",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53398"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396421",
                    "reference_id": "2396421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396421"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3a50cf1e8e5157b82268eee7e330dbe5736a0948",
                    "reference_id": "3a50cf1e8e5157b82268eee7e330dbe5736a0948",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3a50cf1e8e5157b82268eee7e330dbe5736a0948"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/52e6e7a0bc04c85012a9251c7cf2d444a77eb966",
                    "reference_id": "52e6e7a0bc04c85012a9251c7cf2d444a77eb966",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/52e6e7a0bc04c85012a9251c7cf2d444a77eb966"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6afdedc4e66e3846ce497744f01b95c34bf39d21",
                    "reference_id": "6afdedc4e66e3846ce497744f01b95c34bf39d21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6afdedc4e66e3846ce497744f01b95c34bf39d21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53398"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36pz-ffad-1fch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67098?format=api",
            "vulnerability_id": "VCID-38gu-4nx1-jfhy",
            "summary": "kernel: wifi: ath11k: fix memory leak in WMI firmware stats",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401460",
                    "reference_id": "2401460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53602"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38gu-4nx1-jfhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78053?format=api",
            "vulnerability_id": "VCID-38ja-dsj5-qyfc",
            "summary": "kernel: eBPF: insufficient stack type checks in dynptr",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39191.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39191.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02697",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02675",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0272",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.027",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.035",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03479",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03465",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03471",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03517",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03481",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03349",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03362",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39191"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226783",
                    "reference_id": "2226783",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226783"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-39191",
                    "reference_id": "CVE-2023-39191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-39191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0381",
                    "reference_id": "RHSA-2024:0381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0381"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439",
                    "reference_id": "RHSA-2024:0439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448",
                    "reference_id": "RHSA-2024:0448",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0448"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/",
                    "reference_id": "ZDI-CAN-19399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-39191"
            ],
            "risk_score": 3.7,
            "exploitability": "0.5",
            "weighted_severity": "7.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38ja-dsj5-qyfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67640?format=api",
            "vulnerability_id": "VCID-3b1b-x9r2-gfcs",
            "summary": "kernel: block: be a bit more careful in checking for NULL bdev while polling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53366.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53366.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53366"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0510d5e654d05053ed0e6309a9b42043ac9903ab",
                    "reference_id": "0510d5e654d05053ed0e6309a9b42043ac9903ab",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0510d5e654d05053ed0e6309a9b42043ac9903ab"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1af0bdca03f367874da45d6cbe05fa05b90b1439",
                    "reference_id": "1af0bdca03f367874da45d6cbe05fa05b90b1439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1af0bdca03f367874da45d6cbe05fa05b90b1439"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396126",
                    "reference_id": "2396126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396126"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/310726c33ad76cebdee312dbfafc12c1b44bf977",
                    "reference_id": "310726c33ad76cebdee312dbfafc12c1b44bf977",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/310726c33ad76cebdee312dbfafc12c1b44bf977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53366"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1b-x9r2-gfcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65416?format=api",
            "vulnerability_id": "VCID-3ccd-pjgj-6qay",
            "summary": "kernel: net: hsr: avoid possible NULL deref in skb_clone()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50817.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50817.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50817"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50817"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426194",
                    "reference_id": "2426194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426194"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50817"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ccd-pjgj-6qay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65415?format=api",
            "vulnerability_id": "VCID-3e91-ctqb-8kc9",
            "summary": "kernel: net/sched: flower: fix filter idr initialization",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54206.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54206.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54206"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426193",
                    "reference_id": "2426193",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426193"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54206"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3e91-ctqb-8kc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66998?format=api",
            "vulnerability_id": "VCID-3geu-x5r8-4yb8",
            "summary": "kernel: drm/amdgpu: Fix size validation for non-exclusive domains (v4)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50527.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50527.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0211",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50527"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402249",
                    "reference_id": "2402249",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402249"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50527"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3geu-x5r8-4yb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73461?format=api",
            "vulnerability_id": "VCID-3jr3-h29m-fqg5",
            "summary": "kernel: memcg: fix possible use-after-free in memcg_write_event_control()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48988.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48988.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02152",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02158",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0213",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02181",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02172",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02202",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02157",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02171",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02148",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48988"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc",
                    "reference_id": "0ed074317b835caa6c03bcfa8f133365324673dc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320681",
                    "reference_id": "2320681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320681"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917",
                    "reference_id": "35963b31821920908e397146502066f6b032c917",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088",
                    "reference_id": "4a7ba45b1a435e7097ca0f79a847d0949d0eb088",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13",
                    "reference_id": "aad8bbd17a1d586005feb9226c2e9cfce1432e13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125",
                    "reference_id": "b77600e26fd48727a95ffd50ba1e937efb548125",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8",
                    "reference_id": "e1ae97624ecf400ea56c238bff23e5cd139df0b8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
                    "reference_id": "f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48988"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jr3-h29m-fqg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65687?format=api",
            "vulnerability_id": "VCID-3nkq-cb9e-tub6",
            "summary": "kernel: wifi: rtw88: use work to update rate to avoid RCU warning",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54071"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425074",
                    "reference_id": "2425074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54071"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nkq-cb9e-tub6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67517?format=api",
            "vulnerability_id": "VCID-3qrj-drkz-5kf4",
            "summary": "kernel: scsi: ufs: core: Fix device management cmd timeout flow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53387.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53387.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01513",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01416",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01518",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01526",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01525",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01533",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0152",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01494",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01498",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01502",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01487",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01486",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53387"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396407",
                    "reference_id": "2396407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396407"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/36822124f9de200cedc2f42516301b50d386a6cd",
                    "reference_id": "36822124f9de200cedc2f42516301b50d386a6cd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:04Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/36822124f9de200cedc2f42516301b50d386a6cd"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3ffd2cd644e0f1eea01339831bac4b1054e8817c",
                    "reference_id": "3ffd2cd644e0f1eea01339831bac4b1054e8817c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:04Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3ffd2cd644e0f1eea01339831bac4b1054e8817c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cf45493432704786a0f8294c7723ad4eeb5fff24",
                    "reference_id": "cf45493432704786a0f8294c7723ad4eeb5fff24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:04Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cf45493432704786a0f8294c7723ad4eeb5fff24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53387"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qrj-drkz-5kf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66234?format=api",
            "vulnerability_id": "VCID-3tbb-nsen-3bbd",
            "summary": "kernel: wifi: ath12k: Handle lock during peer_id find",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53764.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53764.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06301",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10572",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10539",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10368",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10481",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53764"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419850",
                    "reference_id": "2419850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53764"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tbb-nsen-3bbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67040?format=api",
            "vulnerability_id": "VCID-3xa4-a7x2-huh7",
            "summary": "kernel: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50515.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50515.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50515"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402292",
                    "reference_id": "2402292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50515"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xa4-a7x2-huh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67379?format=api",
            "vulnerability_id": "VCID-3xez-gzc6-tuh5",
            "summary": "kernel: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53521.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53521.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53521",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53521"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400814",
                    "reference_id": "2400814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400814"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10772",
                    "reference_id": "RHSA-2024:10772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10772"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53521"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xez-gzc6-tuh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67599?format=api",
            "vulnerability_id": "VCID-477g-7889-57dq",
            "summary": "kernel: wifi: iwlwifi: fw: fix memory leak in debugfs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53422.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53422.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53422"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53422"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396527",
                    "reference_id": "2396527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396527"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/37f64bc8e001f216566d17ef9fd5608c762ebcd4",
                    "reference_id": "37f64bc8e001f216566d17ef9fd5608c762ebcd4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/37f64bc8e001f216566d17ef9fd5608c762ebcd4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3d90d2f4a018fe8cfd65068bc6350b6222be4852",
                    "reference_id": "3d90d2f4a018fe8cfd65068bc6350b6222be4852",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3d90d2f4a018fe8cfd65068bc6350b6222be4852"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/89496d6cff297c88fe0286a440c380ceb172da2b",
                    "reference_id": "89496d6cff297c88fe0286a440c380ceb172da2b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/89496d6cff297c88fe0286a440c380ceb172da2b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b830ba20b43be52eae7d4087b61a0079dec56820",
                    "reference_id": "b830ba20b43be52eae7d4087b61a0079dec56820",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b830ba20b43be52eae7d4087b61a0079dec56820"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e302e9ca14a86a80eadfb24a34d8675aadaf3ef3",
                    "reference_id": "e302e9ca14a86a80eadfb24a34d8675aadaf3ef3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e302e9ca14a86a80eadfb24a34d8675aadaf3ef3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fe17124282da055cb2e53f0131521459b5c7866c",
                    "reference_id": "fe17124282da055cb2e53f0131521459b5c7866c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fe17124282da055cb2e53f0131521459b5c7866c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53422"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-477g-7889-57dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69790?format=api",
            "vulnerability_id": "VCID-49dd-kxn1-jub7",
            "summary": "kernel: drm/i915/active: Fix misuse of non-idle barriers as fence trackers",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19544",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1948",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19372",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19363",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19324",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19218",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.193",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363680",
                    "reference_id": "2363680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363680"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53087"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49dd-kxn1-jub7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70715?format=api",
            "vulnerability_id": "VCID-49hk-ypve-73fb",
            "summary": "kernel: acpi: Fix suspend with Xen PV",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52994.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52994.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08391",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08356",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08233",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08367",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08332",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.166",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16718",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52994"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355509",
                    "reference_id": "2355509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355509"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b96903b7fc8c82ddfd92df4cdd83db3e567da0a5",
                    "reference_id": "b96903b7fc8c82ddfd92df4cdd83db3e567da0a5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b96903b7fc8c82ddfd92df4cdd83db3e567da0a5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fe0ba8c23f9a35b0307eb662f16dd3a75fcdae41",
                    "reference_id": "fe0ba8c23f9a35b0307eb662f16dd3a75fcdae41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fe0ba8c23f9a35b0307eb662f16dd3a75fcdae41"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52994"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49hk-ypve-73fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71314?format=api",
            "vulnerability_id": "VCID-4cqy-2h5s-7bdg",
            "summary": "kernel: xprtrdma: treat all calls not a bcall when bc_serv is NULL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08089",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08046",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11681",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11545",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15143",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15252",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15213",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15149",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15071",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15122",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15165",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15108",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15231",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49321"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347881",
                    "reference_id": "2347881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347881"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49321"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4cqy-2h5s-7bdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66961?format=api",
            "vulnerability_id": "VCID-4fqf-6kxn-cybn",
            "summary": "kernel: drm/i915/gvt: fix vgpu debugfs clean in remove",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03026",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03338",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402211",
                    "reference_id": "2402211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402211"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53625"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fqf-6kxn-cybn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70695?format=api",
            "vulnerability_id": "VCID-4ft1-b415-t3dp",
            "summary": "kernel: bpf: Skip task with pid=1 in send_signal_common()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52992.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52992.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06832",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06881",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06865",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06951",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06949",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06987",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0699",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06955",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13189",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15283",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52992"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355487",
                    "reference_id": "2355487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52992"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ft1-b415-t3dp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65336?format=api",
            "vulnerability_id": "VCID-4g4s-7yz9-kbdj",
            "summary": "kernel: media: usb: siano: Fix use after free bugs caused by do_submit_urb",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54270.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54270.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54270"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426112",
                    "reference_id": "2426112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54270"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4g4s-7yz9-kbdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79048?format=api",
            "vulnerability_id": "VCID-4gq7-1egy-p7a4",
            "summary": "kernel: vmwgfx: use-after-free in vmw_cmd_res_check",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1289",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1298",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.128",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12803",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13192",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13095",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13513",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13249",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13315",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13322",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13295",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133455",
                    "reference_id": "2133455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930",
                    "reference_id": "RHSA-2024:0930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0930"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823",
                    "reference_id": "RHSA-2024:4823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831",
                    "reference_id": "RHSA-2024:4831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4831"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-38457"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66087?format=api",
            "vulnerability_id": "VCID-4gwj-1ntg-dyhz",
            "summary": "kernel: iommu/amd: Improve page fault error reporting",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53789"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420250",
                    "reference_id": "2420250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53789"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gwj-1ntg-dyhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69372?format=api",
            "vulnerability_id": "VCID-4m3h-nubx-m7fu",
            "summary": "kernel: RDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50135.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50135.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0768",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07701",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0776",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07764",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07748",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21987",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50135"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373655",
                    "reference_id": "2373655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50135"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4m3h-nubx-m7fu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69400?format=api",
            "vulnerability_id": "VCID-4mhb-xwq8-xyh8",
            "summary": "kernel: net: atlantic: fix aq_vec index out of range error",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06814",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06919",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06937",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20493",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20675",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20563",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2056",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20529",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20422",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373683",
                    "reference_id": "2373683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10671",
                    "reference_id": "RHSA-2025:10671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10673",
                    "reference_id": "RHSA-2025:10673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10675",
                    "reference_id": "RHSA-2025:10675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10761",
                    "reference_id": "RHSA-2025:10761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10761"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10828",
                    "reference_id": "RHSA-2025:10828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10829",
                    "reference_id": "RHSA-2025:10829",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10829"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10830",
                    "reference_id": "RHSA-2025:10830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10834",
                    "reference_id": "RHSA-2025:10834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11358",
                    "reference_id": "RHSA-2025:11358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11358"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11375",
                    "reference_id": "RHSA-2025:11375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11375"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50066"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mhb-xwq8-xyh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67130?format=api",
            "vulnerability_id": "VCID-4rx9-jqte-1beh",
            "summary": "kernel: net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03017",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03119",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03153",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02993",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03001",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03122",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04332",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53578"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401492",
                    "reference_id": "2401492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4356",
                    "reference_id": "RHSA-2021:4356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53578"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rx9-jqte-1beh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65610?format=api",
            "vulnerability_id": "VCID-4ssv-y86v-9ffc",
            "summary": "kernel: USB: gadget: Fix use-after-free during usb config switch",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50704.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50704.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50704"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424995",
                    "reference_id": "2424995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424995"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50704"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ssv-y86v-9ffc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69887?format=api",
            "vulnerability_id": "VCID-4tkw-gmmk-aqb6",
            "summary": "kernel: net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53110.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53110.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19544",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1948",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19372",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19363",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19324",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19218",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.193",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363781",
                    "reference_id": "2363781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53110"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tkw-gmmk-aqb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65796?format=api",
            "vulnerability_id": "VCID-4usw-914d-g3bp",
            "summary": "kernel: Linux kernel: Denial of Service due to NULL pointer dereference in mptcp fastopen",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425184",
                    "reference_id": "2425184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54085"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4usw-914d-g3bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73515?format=api",
            "vulnerability_id": "VCID-51fu-1f17-s7ct",
            "summary": "kernel: char: tpm: Protect tpm_pm_suspend with locks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48997.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48997.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03783",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03634",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03757",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0376",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03762",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03808",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03765",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03695",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0371",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03733",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03694",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03671",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03623",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320774",
                    "reference_id": "2320774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320774"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/23393c6461422df5bf8084a086ada9a7e17dc2ba",
                    "reference_id": "23393c6461422df5bf8084a086ada9a7e17dc2ba",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/23393c6461422df5bf8084a086ada9a7e17dc2ba"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/25b78bf98b07ff5aceb9b1e24f72ec0236c5c053",
                    "reference_id": "25b78bf98b07ff5aceb9b1e24f72ec0236c5c053",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/25b78bf98b07ff5aceb9b1e24f72ec0236c5c053"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4e0d6c687c925e27fd4bc78a2721d10acf5614d6",
                    "reference_id": "4e0d6c687c925e27fd4bc78a2721d10acf5614d6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4e0d6c687c925e27fd4bc78a2721d10acf5614d6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/571b6bbbf54d835ea6120f65575cb55cd767e603",
                    "reference_id": "571b6bbbf54d835ea6120f65575cb55cd767e603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/571b6bbbf54d835ea6120f65575cb55cd767e603"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d699373ac5f3545243d3c73a1ccab77fdef8cec6",
                    "reference_id": "d699373ac5f3545243d3c73a1ccab77fdef8cec6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d699373ac5f3545243d3c73a1ccab77fdef8cec6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48997"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51fu-1f17-s7ct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69248?format=api",
            "vulnerability_id": "VCID-51w2-fvku-ykff",
            "summary": "kernel: locking/csd_lock: Change csdlock_debug from early_param to __setup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50091.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50091.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06468",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0652",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373532",
                    "reference_id": "2373532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50091"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51w2-fvku-ykff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66956?format=api",
            "vulnerability_id": "VCID-546y-9zy8-wuf8",
            "summary": "kernel: dmaengine: qcom-adm: fix wrong sizeof config in slave_config",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402204",
                    "reference_id": "2402204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50540"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-546y-9zy8-wuf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65628?format=api",
            "vulnerability_id": "VCID-5981-2zpg-e7ch",
            "summary": "kernel: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54057.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54057.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54057"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425015",
                    "reference_id": "2425015",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425015"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54057"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5981-2zpg-e7ch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65341?format=api",
            "vulnerability_id": "VCID-5ct6-jgrp-fqa5",
            "summary": "kernel: nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54276.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54276.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54276"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426117",
                    "reference_id": "2426117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54276"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ct6-jgrp-fqa5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67519?format=api",
            "vulnerability_id": "VCID-5d3a-d4xk-n7d2",
            "summary": "kernel: tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50389.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50389.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50389"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/08fd965521d0e172d540cf945517810895fcb199",
                    "reference_id": "08fd965521d0e172d540cf945517810895fcb199",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/08fd965521d0e172d540cf945517810895fcb199"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0bd9b4be721c776f77adcaf34105dfca3007ddb9",
                    "reference_id": "0bd9b4be721c776f77adcaf34105dfca3007ddb9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0bd9b4be721c776f77adcaf34105dfca3007ddb9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1af2232b13837ce0f3a082b9f43735b09aafc367",
                    "reference_id": "1af2232b13837ce0f3a082b9f43735b09aafc367",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1af2232b13837ce0f3a082b9f43735b09aafc367"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396409",
                    "reference_id": "2396409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396409"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2fcd3dc8b97a14f1672729c86b7041a1a89b052a",
                    "reference_id": "2fcd3dc8b97a14f1672729c86b7041a1a89b052a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2fcd3dc8b97a14f1672729c86b7041a1a89b052a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/37e90c374dd11cf4919c51e847c6d6ced0abc555",
                    "reference_id": "37e90c374dd11cf4919c51e847c6d6ced0abc555",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/37e90c374dd11cf4919c51e847c6d6ced0abc555"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/927860dfa161ae8392a264197257dbdc52b26b0f",
                    "reference_id": "927860dfa161ae8392a264197257dbdc52b26b0f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/927860dfa161ae8392a264197257dbdc52b26b0f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/986cd9a9b95423e35a2cbb8e9105aec0e0d7f337",
                    "reference_id": "986cd9a9b95423e35a2cbb8e9105aec0e0d7f337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/986cd9a9b95423e35a2cbb8e9105aec0e0d7f337"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b0785edaf649e5f04dc7f75533e810f4c00e4106",
                    "reference_id": "b0785edaf649e5f04dc7f75533e810f4c00e4106",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b0785edaf649e5f04dc7f75533e810f4c00e4106"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50389"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5d3a-d4xk-n7d2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67046?format=api",
            "vulnerability_id": "VCID-5gd6-emds-4qes",
            "summary": "kernel: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03396",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402298",
                    "reference_id": "2402298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50532"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5gd6-emds-4qes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67160?format=api",
            "vulnerability_id": "VCID-5kgk-95zs-tfg2",
            "summary": "kernel: iommu/amd: Fix pci device refcount leak in ppr_notifier()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50505.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50505.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50505"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50505"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401522",
                    "reference_id": "2401522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401522"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50505"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kgk-95zs-tfg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67631?format=api",
            "vulnerability_id": "VCID-5pdd-jzp8-7qcz",
            "summary": "kernel: PCI: Fix use-after-free in pci_bus_release_domain_nr()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04317",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04332",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04123",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04264",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04283",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53363"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396117",
                    "reference_id": "2396117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53363"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5pdd-jzp8-7qcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69843?format=api",
            "vulnerability_id": "VCID-5qtf-w7q3-uyeb",
            "summary": "kernel: dm stats: check for and propagate alloc_percpu failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53044.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53044.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363735",
                    "reference_id": "2363735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363735"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53044"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5qtf-w7q3-uyeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70699?format=api",
            "vulnerability_id": "VCID-5uxv-qrgs-pqd3",
            "summary": "kernel: HID: betop: check shape of output reports",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53015.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53015.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02784",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20961",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53015"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/07bc32e53c7bd5c91472cc485231ef6274db9b76",
                    "reference_id": "07bc32e53c7bd5c91472cc485231ef6274db9b76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/07bc32e53c7bd5c91472cc485231ef6274db9b76"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1a2a47b85cab50a3c146731bfeaf2d860f5344ee",
                    "reference_id": "1a2a47b85cab50a3c146731bfeaf2d860f5344ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1a2a47b85cab50a3c146731bfeaf2d860f5344ee"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355491",
                    "reference_id": "2355491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355491"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/28fc6095da22dc88433d79578ae1c495ebe8ca43",
                    "reference_id": "28fc6095da22dc88433d79578ae1c495ebe8ca43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/28fc6095da22dc88433d79578ae1c495ebe8ca43"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3782c0d6edf658b71354a64d60aa7a296188fc90",
                    "reference_id": "3782c0d6edf658b71354a64d60aa7a296188fc90",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3782c0d6edf658b71354a64d60aa7a296188fc90"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7317326f685824c7c29bd80841fd18041af6bb73",
                    "reference_id": "7317326f685824c7c29bd80841fd18041af6bb73",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7317326f685824c7c29bd80841fd18041af6bb73"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d3065cc56221d1a5eda237e94eaf2a627b88ab79",
                    "reference_id": "d3065cc56221d1a5eda237e94eaf2a627b88ab79",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d3065cc56221d1a5eda237e94eaf2a627b88ab79"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dbab4dba400d6ea9a9697fbbd287adbf7db1dac4",
                    "reference_id": "dbab4dba400d6ea9a9697fbbd287adbf7db1dac4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dbab4dba400d6ea9a9697fbbd287adbf7db1dac4"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53015"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5uxv-qrgs-pqd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69852?format=api",
            "vulnerability_id": "VCID-5yxn-gf61-qkfg",
            "summary": "kernel: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53039.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53039.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20866",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20924",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20638",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20714",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20775",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20793",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2075",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20698",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20675",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20563",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2056",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20529",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20422",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20493",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363745",
                    "reference_id": "2363745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53039"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yxn-gf61-qkfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78765?format=api",
            "vulnerability_id": "VCID-5z9w-ssx5-8kf3",
            "summary": "Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1652.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1652.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02416",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0243",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02429",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02423",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02424",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03591",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03599",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03618",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03448",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0346",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03642",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03597",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03583",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182031",
                    "reference_id": "2182031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182031"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/cve-2023-1652",
                    "reference_id": "cve-2023-1652",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T16:38:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/cve-2023-1652"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230511-0006/",
                    "reference_id": "ntap-20230511-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T16:38:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230511-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10174",
                    "reference_id": "RHSA-2025:10174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10193",
                    "reference_id": "RHSA-2025:10193",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10193"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10671",
                    "reference_id": "RHSA-2025:10671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10675",
                    "reference_id": "RHSA-2025:10675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10675"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6025-1/",
                    "reference_id": "USN-6025-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6025-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6040-1/",
                    "reference_id": "USN-6040-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6040-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6057-1/",
                    "reference_id": "USN-6057-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6057-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6079-1/",
                    "reference_id": "USN-6079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6091-1/",
                    "reference_id": "USN-6091-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6091-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6096-1/",
                    "reference_id": "USN-6096-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6096-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1652"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z9w-ssx5-8kf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65358?format=api",
            "vulnerability_id": "VCID-625p-7tpq-5kf7",
            "summary": "kernel: mptcp: stricter state check in mptcp_worker",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54176.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54176.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54176"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426134",
                    "reference_id": "2426134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54176"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-625p-7tpq-5kf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67864?format=api",
            "vulnerability_id": "VCID-62dd-2w83-w3ax",
            "summary": "kernel: io_uring/msg_ring: Fix NULL pointer dereference in io_msg_send_fd()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50295.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50295.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05469",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05288",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05236",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50295"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395299",
                    "reference_id": "2395299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50295"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62dd-2w83-w3ax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65671?format=api",
            "vulnerability_id": "VCID-64g6-pe8r-9yhy",
            "summary": "kernel: dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50721"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425058",
                    "reference_id": "2425058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425058"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50721"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64g6-pe8r-9yhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67132?format=api",
            "vulnerability_id": "VCID-64gw-2b6h-c7em",
            "summary": "kernel: driver core: fix resource leak in device_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401494",
                    "reference_id": "2401494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53594"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64gw-2b6h-c7em"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75891?format=api",
            "vulnerability_id": "VCID-651q-c9rt-8fgs",
            "summary": "kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52735.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52735.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14925",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14769",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14719",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14779",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14816",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14815",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1476",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14642",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14874",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14814",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52735"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282618",
                    "reference_id": "2282618",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282618"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9",
                    "reference_id": "5b4a79ba65a1ab479903fff2e604865d229b70a9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:47:22Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7499859881488da97589f3c79cc66fa75748ad49",
                    "reference_id": "7499859881488da97589f3c79cc66fa75748ad49",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:47:22Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7499859881488da97589f3c79cc66fa75748ad49"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f312367f5246e04df564d341044286e9e37a97ba",
                    "reference_id": "f312367f5246e04df564d341044286e9e37a97ba",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T20:47:22Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f312367f5246e04df564d341044286e9e37a97ba"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5672",
                    "reference_id": "RHSA-2024:5672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5672"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5673",
                    "reference_id": "RHSA-2024:5673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5673"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52735"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-651q-c9rt-8fgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67610?format=api",
            "vulnerability_id": "VCID-657g-4e3s-qbbb",
            "summary": "kernel: iomap: iomap: fix memory corruption when recording errors during writeback",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0268",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02705",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02694",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02725",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02684",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03592",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03722",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03725",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03718",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03771",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03733",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03753",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03579",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50406"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396538",
                    "reference_id": "2396538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396538"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2",
                    "reference_id": "3d5f3ba1ac28059bdf7000cae2403e4e984308d2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2",
                    "reference_id": "7308591d9c7787aec58f6a01a7823f14e90db7a2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6",
                    "reference_id": "82c66c46f73b88be74c869e2cbfef45281adf3c6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051",
                    "reference_id": "RHSA-2025:21051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21084",
                    "reference_id": "RHSA-2025:21084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091",
                    "reference_id": "RHSA-2025:21091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128",
                    "reference_id": "RHSA-2025:21128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136",
                    "reference_id": "RHSA-2025:21136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22998",
                    "reference_id": "RHSA-2025:22998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445",
                    "reference_id": "RHSA-2025:23445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463",
                    "reference_id": "RHSA-2025:23463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23947",
                    "reference_id": "RHSA-2025:23947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23947"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23960",
                    "reference_id": "RHSA-2025:23960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23960"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50406"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-657g-4e3s-qbbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65698?format=api",
            "vulnerability_id": "VCID-673s-2xd7-tbbt",
            "summary": "kernel: Linux kernel: Resource exhaustion in amdgpu due to PCI device reference count leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50760"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50760"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425086",
                    "reference_id": "2425086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50760"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-673s-2xd7-tbbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69988?format=api",
            "vulnerability_id": "VCID-67ha-wmbz-u7ea",
            "summary": "kernel: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49885.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49885.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12692",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12806",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12762",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12671",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12775",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12794",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12757",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12649",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12556",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12827",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12878",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12845",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49885"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49885"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363361",
                    "reference_id": "2363361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363361"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/43d2748394c3feb86c0c771466f5847e274fc043",
                    "reference_id": "43d2748394c3feb86c0c771466f5847e274fc043",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/43d2748394c3feb86c0c771466f5847e274fc043"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4c10c854113720cbfe75d4f51db79b700a629e73",
                    "reference_id": "4c10c854113720cbfe75d4f51db79b700a629e73",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4c10c854113720cbfe75d4f51db79b700a629e73"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9edf20e5a1d805855e78f241cf221d741b50d482",
                    "reference_id": "9edf20e5a1d805855e78f241cf221d741b50d482",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9edf20e5a1d805855e78f241cf221d741b50d482"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c50ec15725e005e9fb20bce69b6c23b135a4a9b7",
                    "reference_id": "c50ec15725e005e9fb20bce69b6c23b135a4a9b7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c50ec15725e005e9fb20bce69b6c23b135a4a9b7"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49885"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-67ha-wmbz-u7ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78664?format=api",
            "vulnerability_id": "VCID-69a4-qgg3-hkg5",
            "summary": "kernel: vmwgfx: race condition leading to information disclosure vulnerability",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00304",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00312",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00303",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0031",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00299",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00297",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00293",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33951"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218195",
                    "reference_id": "2218195",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218195"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-33951",
                    "reference_id": "CVE-2023-33951",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-33951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823",
                    "reference_id": "RHSA-2024:4823",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831",
                    "reference_id": "RHSA-2024:4831",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4831"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/",
                    "reference_id": "ZDI-CAN-20110",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-33951"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69a4-qgg3-hkg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65708?format=api",
            "vulnerability_id": "VCID-6aaf-fc5z-5uah",
            "summary": "kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14006",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13809",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13892",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13901",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13816",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13725",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1372",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13817",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18053",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18138",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18102",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17963",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425096",
                    "reference_id": "2425096",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425096"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54102"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6aaf-fc5z-5uah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78855?format=api",
            "vulnerability_id": "VCID-6dv1-d7mh-fkct",
            "summary": "kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3358.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3358.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01099",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01093",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01098",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00927",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0093",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00926",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0091",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00912",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00908",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00916",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00966",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3358"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169343",
                    "reference_id": "2169343",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169343"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8",
                    "reference_id": "?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:09Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3358"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dv1-d7mh-fkct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78662?format=api",
            "vulnerability_id": "VCID-6ehx-j3nb-2ffn",
            "summary": "kernel: mpls: double free on sysctl allocation failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03275",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03342",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03294",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03279",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03251",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0323",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03334",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03325",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03324",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0337",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0332",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03285",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182443",
                    "reference_id": "2182443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182443"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13",
                    "reference_id": "ChangeLog-6.1.13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                    "reference_id": "fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377"
                },
                {
                    "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                    "reference_id": "?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230316-0009/",
                    "reference_id": "ntap-20230316-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230316-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5978-1/",
                    "reference_id": "USN-5978-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5978-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6001-1/",
                    "reference_id": "USN-6001-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6001-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6013-1/",
                    "reference_id": "USN-6013-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6013-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6014-1/",
                    "reference_id": "USN-6014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6014-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6024-1/",
                    "reference_id": "USN-6024-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6024-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6025-1/",
                    "reference_id": "USN-6025-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6025-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6027-1/",
                    "reference_id": "USN-6027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6027-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6029-1/",
                    "reference_id": "USN-6029-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6029-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6030-1/",
                    "reference_id": "USN-6030-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6030-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6040-1/",
                    "reference_id": "USN-6040-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6040-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6057-1/",
                    "reference_id": "USN-6057-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6057-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6071-1/",
                    "reference_id": "USN-6071-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6071-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6072-1/",
                    "reference_id": "USN-6072-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6072-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6093-1/",
                    "reference_id": "USN-6093-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6093-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-26545"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ehx-j3nb-2ffn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65612?format=api",
            "vulnerability_id": "VCID-6mc5-kj3h-2qaq",
            "summary": "kernel: Linux kernel: Memory leak in io_uring can lead to denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54041.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54041.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54041"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424997",
                    "reference_id": "2424997",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424997"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54041"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mc5-kj3h-2qaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65372?format=api",
            "vulnerability_id": "VCID-6n6j-exu4-5qfq",
            "summary": "kernel: md/raid10: fix memleak of md thread",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54294.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54294.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426149",
                    "reference_id": "2426149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54294"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6n6j-exu4-5qfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66787?format=api",
            "vulnerability_id": "VCID-6nbw-e9dp-gffj",
            "summary": "kernel: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12177",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12163",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12033",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12035",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1215",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12126",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12092",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11992",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11905",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1204",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53717"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405741",
                    "reference_id": "2405741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53717"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6nbw-e9dp-gffj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73486?format=api",
            "vulnerability_id": "VCID-6nfu-4zs9-2yfn",
            "summary": "kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48991.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48991.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01942",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01932",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01916",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01892",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01891",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01978",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01964",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01961",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0199",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01933",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01947",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3",
                    "reference_id": "1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320713",
                    "reference_id": "2320713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320713"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/275c626c131cfe141beeb6c575e31fa53d32da19",
                    "reference_id": "275c626c131cfe141beeb6c575e31fa53d32da19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/275c626c131cfe141beeb6c575e31fa53d32da19"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5450535901d89a5dcca5fbbc59a24fe89caeb465",
                    "reference_id": "5450535901d89a5dcca5fbbc59a24fe89caeb465",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5450535901d89a5dcca5fbbc59a24fe89caeb465"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5ffc2a75534d9d74d49760f983f8eb675fa63d69",
                    "reference_id": "5ffc2a75534d9d74d49760f983f8eb675fa63d69",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5ffc2a75534d9d74d49760f983f8eb675fa63d69"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7f445ca2e0e59c7971d0b7b853465e50844ab596",
                    "reference_id": "7f445ca2e0e59c7971d0b7b853465e50844ab596",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7f445ca2e0e59c7971d0b7b853465e50844ab596"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c23105673228c349739e958fa33955ed8faddcaf",
                    "reference_id": "c23105673228c349739e958fa33955ed8faddcaf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c23105673228c349739e958fa33955ed8faddcaf"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f268f6cf875f3220afc77bdd0bf1bb136eb54db9",
                    "reference_id": "f268f6cf875f3220afc77bdd0bf1bb136eb54db9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f268f6cf875f3220afc77bdd0bf1bb136eb54db9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3",
                    "reference_id": "ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:32Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48991"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6nfu-4zs9-2yfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67600?format=api",
            "vulnerability_id": "VCID-6p1q-p1qq-sfcc",
            "summary": "kernel: net: add vlan_get_protocol_and_depth() helper",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53433.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53433.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53433"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53433"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/15eaeb8941f12fcc2713c4bf6eb8f76a37854b4d",
                    "reference_id": "15eaeb8941f12fcc2713c4bf6eb8f76a37854b4d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/15eaeb8941f12fcc2713c4bf6eb8f76a37854b4d"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396528",
                    "reference_id": "2396528",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396528"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/34a5ee69ec6273f0aee79e7ce4d14afc83ca8122",
                    "reference_id": "34a5ee69ec6273f0aee79e7ce4d14afc83ca8122",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/34a5ee69ec6273f0aee79e7ce4d14afc83ca8122"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4063384ef762cc5946fc7a3f89879e76c6ec51e2",
                    "reference_id": "4063384ef762cc5946fc7a3f89879e76c6ec51e2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4063384ef762cc5946fc7a3f89879e76c6ec51e2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4188c5269475ac59d467b5814c5df02756f6d907",
                    "reference_id": "4188c5269475ac59d467b5814c5df02756f6d907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4188c5269475ac59d467b5814c5df02756f6d907"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/55caf900e13cd04466def08173a14b41d18c19c3",
                    "reference_id": "55caf900e13cd04466def08173a14b41d18c19c3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/55caf900e13cd04466def08173a14b41d18c19c3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9dd9ffe118415b4ac1cebac43443000072bc8f46",
                    "reference_id": "9dd9ffe118415b4ac1cebac43443000072bc8f46",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9dd9ffe118415b4ac1cebac43443000072bc8f46"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53433"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6p1q-p1qq-sfcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67306?format=api",
            "vulnerability_id": "VCID-6pku-1g91-1keq",
            "summary": "kernel: Linux kernel: Denial of Service in vmwgfx due to invalid DMA surface copies",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50440.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50440.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50440"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400740",
                    "reference_id": "2400740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50440"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pku-1g91-1keq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66283?format=api",
            "vulnerability_id": "VCID-6ppb-wz59-qqhp",
            "summary": "kernel: drm/amdgpu/powerplay/psm: Fix memory leak in power state init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06061",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10049",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50617"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419926",
                    "reference_id": "2419926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50617"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ppb-wz59-qqhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66107?format=api",
            "vulnerability_id": "VCID-6vvj-9f4y-fqbz",
            "summary": "kernel: PCI: Fix pci_device_is_present() for VFs by checking PF",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50636.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50636.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08811",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50636"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420272",
                    "reference_id": "2420272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420272"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50636"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vvj-9f4y-fqbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71180?format=api",
            "vulnerability_id": "VCID-6vxm-yd85-bkdb",
            "summary": "kernel: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10417",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20015",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20272",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20297",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20251",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20192",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20184",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20188",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20187",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20065",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2006",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20029",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19938",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20132",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20213",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49716"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0b325d993995a321f6ab4e6c51f0504ec092bf5b",
                    "reference_id": "0b325d993995a321f6ab4e6c51f0504ec092bf5b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0b325d993995a321f6ab4e6c51f0504ec092bf5b"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347745",
                    "reference_id": "2347745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347745"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/58e67c81e229351027d28c610638378606e33a08",
                    "reference_id": "58e67c81e229351027d28c610638378606e33a08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/58e67c81e229351027d28c610638378606e33a08"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7c9dd9d23f26dabcfb14148b9acdfba540418b19",
                    "reference_id": "7c9dd9d23f26dabcfb14148b9acdfba540418b19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7c9dd9d23f26dabcfb14148b9acdfba540418b19"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c83c34c57798fc41faefcf078be78683db2f4beb",
                    "reference_id": "c83c34c57798fc41faefcf078be78683db2f4beb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c83c34c57798fc41faefcf078be78683db2f4beb"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d",
                    "reference_id": "ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49716"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vxm-yd85-bkdb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65597?format=api",
            "vulnerability_id": "VCID-6xec-53j6-fqaf",
            "summary": "kernel: wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50701.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50701.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50701"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424982",
                    "reference_id": "2424982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424982"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50701"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xec-53j6-fqaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67511?format=api",
            "vulnerability_id": "VCID-6y44-kbkm-w3fy",
            "summary": "kernel: drivers: base: dd: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53390.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53390.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04057",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53390"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396398",
                    "reference_id": "2396398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396398"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/36c893d3a759ae7c91ee7d4871ebfc7504f08c40",
                    "reference_id": "36c893d3a759ae7c91ee7d4871ebfc7504f08c40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/36c893d3a759ae7c91ee7d4871ebfc7504f08c40"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5a7a9efdb193d3c8a35821548a8e99612c358828",
                    "reference_id": "5a7a9efdb193d3c8a35821548a8e99612c358828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5a7a9efdb193d3c8a35821548a8e99612c358828"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7f1e53f88e8babf293ec052b70aa9d2a3554360c",
                    "reference_id": "7f1e53f88e8babf293ec052b70aa9d2a3554360c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7f1e53f88e8babf293ec052b70aa9d2a3554360c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8e47e2bf78812adbd73c45c941d3c51add30b58d",
                    "reference_id": "8e47e2bf78812adbd73c45c941d3c51add30b58d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8e47e2bf78812adbd73c45c941d3c51add30b58d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53390"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6y44-kbkm-w3fy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78339?format=api",
            "vulnerability_id": "VCID-6znz-cyqz-7qeh",
            "summary": "kernel: r592: race condition leading to use-after-free in r592_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215837",
                    "reference_id": "2215837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-35825"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6znz-cyqz-7qeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70134?format=api",
            "vulnerability_id": "VCID-754k-suks-5ydu",
            "summary": "kernel: bpf: Fix memory leaks in __check_func_call",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49837.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49837.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49837"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363505",
                    "reference_id": "2363505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363505"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/83946d772e756734a900ef99dbe0aeda506adf37",
                    "reference_id": "83946d772e756734a900ef99dbe0aeda506adf37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:02:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/83946d772e756734a900ef99dbe0aeda506adf37"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d4944497827a3d14bc5a26dbcfb7433eb5a956c0",
                    "reference_id": "d4944497827a3d14bc5a26dbcfb7433eb5a956c0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:02:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d4944497827a3d14bc5a26dbcfb7433eb5a956c0"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/eb86559a691cea5fa63e57a03ec3dc9c31e97955",
                    "reference_id": "eb86559a691cea5fa63e57a03ec3dc9c31e97955",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:02:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/eb86559a691cea5fa63e57a03ec3dc9c31e97955"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49837"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-754k-suks-5ydu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67785?format=api",
            "vulnerability_id": "VCID-75sr-d518-jbg5",
            "summary": "kernel: USB: chipidea: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53334.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53334.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03945",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03915",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395888",
                    "reference_id": "2395888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395888"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4322661af6d7a586a5798ab9aa443f49895b6943",
                    "reference_id": "4322661af6d7a586a5798ab9aa443f49895b6943",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:02Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4322661af6d7a586a5798ab9aa443f49895b6943"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/610373dd354f3d393aa3bdcab59f55024c16b5e5",
                    "reference_id": "610373dd354f3d393aa3bdcab59f55024c16b5e5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:02Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/610373dd354f3d393aa3bdcab59f55024c16b5e5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/972e0682f6e3ee6ecf002657df4aaa511d51dd6c",
                    "reference_id": "972e0682f6e3ee6ecf002657df4aaa511d51dd6c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:02Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/972e0682f6e3ee6ecf002657df4aaa511d51dd6c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ff35f3ea3baba5b81416ac02d005cfbf6dd182fa",
                    "reference_id": "ff35f3ea3baba5b81416ac02d005cfbf6dd182fa",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:02Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ff35f3ea3baba5b81416ac02d005cfbf6dd182fa"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53334"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75sr-d518-jbg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78548?format=api",
            "vulnerability_id": "VCID-7bbh-sp1w-v3a9",
            "summary": "Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04883",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04951",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04969",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05002",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04961",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04908",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04918",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05065",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05097",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05138",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05129",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05177",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883",
                    "reference_id": "2177883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6127-1/",
                    "reference_id": "USN-6127-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6127-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6130-1/",
                    "reference_id": "USN-6130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6130-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6131-1/",
                    "reference_id": "USN-6131-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6131-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6132-1/",
                    "reference_id": "USN-6132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6135-1/",
                    "reference_id": "USN-6135-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6135-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6149-1/",
                    "reference_id": "USN-6149-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6149-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6150-1/",
                    "reference_id": "USN-6150-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6150-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6162-1/",
                    "reference_id": "USN-6162-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6162-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6173-1/",
                    "reference_id": "USN-6173-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6173-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6175-1/",
                    "reference_id": "USN-6175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6186-1/",
                    "reference_id": "USN-6186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6186-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6460-1/",
                    "reference_id": "USN-6460-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6460-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1380"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bbh-sp1w-v3a9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65549?format=api",
            "vulnerability_id": "VCID-7gjh-aev7-b7d1",
            "summary": "kernel: scsi: mpi3mr: Fix an issue found by KASAN",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54011"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424934",
                    "reference_id": "2424934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424934"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54011"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gjh-aev7-b7d1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67006?format=api",
            "vulnerability_id": "VCID-7m61-6vud-xbhc",
            "summary": "kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50536.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50536.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50536"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402257",
                    "reference_id": "2402257",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402257"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1988",
                    "reference_id": "RHSA-2022:1988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50536"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7m61-6vud-xbhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67546?format=api",
            "vulnerability_id": "VCID-7q6y-6qxn-q3dv",
            "summary": "kernel: USB: ULPI: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53410.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53410.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53410",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02331",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02337",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02435",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02442",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02461",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0246",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02484",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02456",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02455",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53410"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396449",
                    "reference_id": "2396449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396449"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2b8aa879e28df11e45855b04788050c61fb6b02a",
                    "reference_id": "2b8aa879e28df11e45855b04788050c61fb6b02a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2b8aa879e28df11e45855b04788050c61fb6b02a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8f4d25eba599c4bd4b5ea8ae8752cda480a9d563",
                    "reference_id": "8f4d25eba599c4bd4b5ea8ae8752cda480a9d563",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8f4d25eba599c4bd4b5ea8ae8752cda480a9d563"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dcbe69f4f743a938344b32e60531ea55355e0c08",
                    "reference_id": "dcbe69f4f743a938344b32e60531ea55355e0c08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dcbe69f4f743a938344b32e60531ea55355e0c08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53410"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7q6y-6qxn-q3dv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67573?format=api",
            "vulnerability_id": "VCID-7snw-j3bm-wkg9",
            "summary": "kernel: irqchip/wpcm450: Fix memory leak in wpcm450_aic_of_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50416.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50416.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50416",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50416"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396499",
                    "reference_id": "2396499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396499"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4208d4faf36573a507b5e5de17abe342e9276759",
                    "reference_id": "4208d4faf36573a507b5e5de17abe342e9276759",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:10:27Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4208d4faf36573a507b5e5de17abe342e9276759"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/740efb64ca5e8f2b30ac843bc4ab07950479fed4",
                    "reference_id": "740efb64ca5e8f2b30ac843bc4ab07950479fed4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:10:27Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/740efb64ca5e8f2b30ac843bc4ab07950479fed4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/773c9d7f127f7a599d42ceed831de69f5aa22f03",
                    "reference_id": "773c9d7f127f7a599d42ceed831de69f5aa22f03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:10:27Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/773c9d7f127f7a599d42ceed831de69f5aa22f03"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bcbcb396e1a8bd4dcaabfb0d5b98abae70880470",
                    "reference_id": "bcbcb396e1a8bd4dcaabfb0d5b98abae70880470",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:10:27Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bcbcb396e1a8bd4dcaabfb0d5b98abae70880470"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50416"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7snw-j3bm-wkg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69848?format=api",
            "vulnerability_id": "VCID-7uu6-ytsy-buh2",
            "summary": "kernel: wifi: mt76: connac: do not check WED status for non-mmio devices",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53086.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53086.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21166",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21221",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21015",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21075",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21092",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20997",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20986",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20965",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20835",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20832",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20799",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20702",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20776",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53086"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363740",
                    "reference_id": "2363740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53086"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7uu6-ytsy-buh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67503?format=api",
            "vulnerability_id": "VCID-7vst-mvv6-dudd",
            "summary": "kernel: ALSA: hda: Fix Oops by 9.1 surround channel names",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53400.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53400.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02476",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02507",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02491",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02489",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0248",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0252",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a",
                    "reference_id": "082dcd51667b29097500c824c37f24da997a6a8a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396390",
                    "reference_id": "2396390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396390"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6",
                    "reference_id": "3b44ec8c5c44790a82f07e90db45643c762878c6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4",
                    "reference_id": "4ef155ddf9578bf035964d58739fdcd7dd44b4a4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825",
                    "reference_id": "546b1f5f45a355ae0d3a8041cdaca597dfcac825",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6",
                    "reference_id": "b5694aae4c2d9a288bafce7d38f122769e0428e6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e",
                    "reference_id": "dc8c569d59f17b17d7bca4f68c36bd571659921e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8",
                    "reference_id": "e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634",
                    "reference_id": "fcf637461019e9a5a0c12fc5c42a9db1779b0634",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53400"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vst-mvv6-dudd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69111?format=api",
            "vulnerability_id": "VCID-7z4k-sdeh-ubdd",
            "summary": "kernel: cifs: Fix memory leak when using fscache",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50107.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50107.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04693",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04751",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04784",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04796",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04788",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50107"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373409",
                    "reference_id": "2373409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373409"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50107"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7z4k-sdeh-ubdd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65608?format=api",
            "vulnerability_id": "VCID-81rm-qknn-57c3",
            "summary": "kernel: io_uring/rw: defer fsnotify calls to task context",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50705.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50705.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50705"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424993",
                    "reference_id": "2424993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424993"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50705"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81rm-qknn-57c3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78720?format=api",
            "vulnerability_id": "VCID-86j6-rxsj-jucj",
            "summary": "kernel: sctp: fail if no bound addresses can be used for a given scope",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01603",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01609",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01594",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01592",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01974",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02018",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02004",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02001",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02031",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01981",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02421",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02428",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/23/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2023/01/23/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173430",
                    "reference_id": "2173430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173430"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/11/05/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/11/05/4"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f",
                    "reference_id": "?id=458e279f861d3f61796894cd158b780765a1569f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0723",
                    "reference_id": "RHSA-2024:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0725",
                    "reference_id": "RHSA-2024:0725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0725"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930",
                    "reference_id": "RHSA-2024:0930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0930"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5978-1/",
                    "reference_id": "USN-5978-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5978-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6001-1/",
                    "reference_id": "USN-6001-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6001-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6013-1/",
                    "reference_id": "USN-6013-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6013-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6014-1/",
                    "reference_id": "USN-6014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6014-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6025-1/",
                    "reference_id": "USN-6025-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6025-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6027-1/",
                    "reference_id": "USN-6027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6027-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6029-1/",
                    "reference_id": "USN-6029-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6029-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6030-1/",
                    "reference_id": "USN-6030-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6030-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6031-1/",
                    "reference_id": "USN-6031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6031-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6032-1/",
                    "reference_id": "USN-6032-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6032-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6040-1/",
                    "reference_id": "USN-6040-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6040-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6057-1/",
                    "reference_id": "USN-6057-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6057-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6079-1/",
                    "reference_id": "USN-6079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6091-1/",
                    "reference_id": "USN-6091-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6091-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6093-1/",
                    "reference_id": "USN-6093-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6093-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6096-1/",
                    "reference_id": "USN-6096-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6096-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1074"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69322?format=api",
            "vulnerability_id": "VCID-88ed-7s2j-yfd2",
            "summary": "kernel: watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50110.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50110.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15688",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15653",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33335",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33275",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33124",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33107",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3303",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32912",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50110"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373606",
                    "reference_id": "2373606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373606"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683",
                    "reference_id": "RHSA-2022:7683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50110"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88ed-7s2j-yfd2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70711?format=api",
            "vulnerability_id": "VCID-8gkh-etrc-r3g5",
            "summary": "kernel: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49746.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49746.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01176",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15825",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15758",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15628",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15741",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15706",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15641",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15574",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15634",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1568",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15677",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15618",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0094",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1417f59ac0b02130ee56c0c50794b9b257be3d17",
                    "reference_id": "1417f59ac0b02130ee56c0c50794b9b257be3d17",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1417f59ac0b02130ee56c0c50794b9b257be3d17"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355504",
                    "reference_id": "2355504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355504"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/43acd767bd90c5d4172ce7fee5d9007a9a08dea9",
                    "reference_id": "43acd767bd90c5d4172ce7fee5d9007a9a08dea9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/43acd767bd90c5d4172ce7fee5d9007a9a08dea9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/80ee99e52936b2c04cc37b17a14b2ae2f9d282ac",
                    "reference_id": "80ee99e52936b2c04cc37b17a14b2ae2f9d282ac",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/80ee99e52936b2c04cc37b17a14b2ae2f9d282ac"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bd0050b7ffa87c7b260d563646af612f4112a778",
                    "reference_id": "bd0050b7ffa87c7b260d563646af612f4112a778",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bd0050b7ffa87c7b260d563646af612f4112a778"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ce4745a6b8016fae74c95dcd457d4ceef7d98af1",
                    "reference_id": "ce4745a6b8016fae74c95dcd457d4ceef7d98af1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ce4745a6b8016fae74c95dcd457d4ceef7d98af1"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dbe634ce824329d8f14079c3e9f8f11670894bec",
                    "reference_id": "dbe634ce824329d8f14079c3e9f8f11670894bec",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:25:21Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dbe634ce824329d8f14079c3e9f8f11670894bec"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49746"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8gkh-etrc-r3g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69802?format=api",
            "vulnerability_id": "VCID-8hx5-vau1-ybfp",
            "summary": "kernel: drm/edid: fix info leak when failing to get panel id",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23164",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23141",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23158",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2315",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22935",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22928",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22927",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22823",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22906",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363692",
                    "reference_id": "2363692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363692"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53085"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hx5-vau1-ybfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65609?format=api",
            "vulnerability_id": "VCID-8m29-81p9-afeb",
            "summary": "kernel: wifi: ath10k: Delay the unmapping of the buffer",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424994",
                    "reference_id": "2424994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50700"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m29-81p9-afeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70743?format=api",
            "vulnerability_id": "VCID-8pzc-193c-ffbn",
            "summary": "kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52977.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52977.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02331",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06855",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0701",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07006",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07023",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06976",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06975",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06944",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10097",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52977"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30",
                    "reference_id": "0c598aed445eb45b0ee7ba405f7ece99ee349c30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee",
                    "reference_id": "1ac653cf886cdfc082708c82dc6ac6115cebd2ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355538",
                    "reference_id": "2355538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355538"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d",
                    "reference_id": "70154489f531587996f3e9d7cceeee65cff0001d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b",
                    "reference_id": "70d40674a549d498bd63d5432acf46205da1534b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386",
                    "reference_id": "af4e720bc00a2653f7b9df21755b9978b3d7f386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb",
                    "reference_id": "ed6c5e8caf55778500202775167e8ccdb1a030cb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf",
                    "reference_id": "f423c2efd51d7eb1d143c2be7eea233241d9bbbf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52977"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pzc-193c-ffbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70159?format=api",
            "vulnerability_id": "VCID-8ssu-mh67-yubm",
            "summary": "kernel: drbd: use after free in drbd_create_device()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49811.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49811.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15939",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16001",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15801",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15886",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15948",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15924",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15741",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15815",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15811",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1564",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15759",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49811"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363530",
                    "reference_id": "2363530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49811"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ssu-mh67-yubm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78529?format=api",
            "vulnerability_id": "VCID-8uzn-q3h8-8qfs",
            "summary": "kernel: KVM: nVMX: missing consistency checks for CR0 and CR4",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01352",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0134",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01901",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01963",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01911",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03233",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03267",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03282",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03291",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03297",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03318",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5",
                    "reference_id": "112e66017bff7f2837030f34c2bc19501e9212d5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188468",
                    "reference_id": "2188468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188468"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8",
                    "reference_id": "ChangeLog-6.2.8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
                    "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230511-0007/",
                    "reference_id": "ntap-20230511-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230511-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930",
                    "reference_id": "RHSA-2024:0930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0930"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6123-1/",
                    "reference_id": "USN-6123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6123-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6124-1/",
                    "reference_id": "USN-6124-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6124-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6127-1/",
                    "reference_id": "USN-6127-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6127-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6130-1/",
                    "reference_id": "USN-6130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6130-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6131-1/",
                    "reference_id": "USN-6131-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6131-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6132-1/",
                    "reference_id": "USN-6132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6135-1/",
                    "reference_id": "USN-6135-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6135-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6149-1/",
                    "reference_id": "USN-6149-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6149-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6150-1/",
                    "reference_id": "USN-6150-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6150-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6162-1/",
                    "reference_id": "USN-6162-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6162-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6175-1/",
                    "reference_id": "USN-6175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6186-1/",
                    "reference_id": "USN-6186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6186-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6699-1/",
                    "reference_id": "USN-6699-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6699-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-30456"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71603?format=api",
            "vulnerability_id": "VCID-8vzh-zc9k-sydp",
            "summary": "kernel: virtio_net: fix xdp_rxq_info bug after suspend/resume",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49687.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49687.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10638",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10701",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16682",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16641",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16581",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16516",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16525",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16562",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16457",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1645",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16405",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16273",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16391",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16566",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16651",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49687"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348177",
                    "reference_id": "2348177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49687"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzh-zc9k-sydp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69898?format=api",
            "vulnerability_id": "VCID-8xhu-u2bd-nqfz",
            "summary": "kernel: drm/ttm: Fix a NULL pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53095.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53095.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53095",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53095"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363792",
                    "reference_id": "2363792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53095"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8xhu-u2bd-nqfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67319?format=api",
            "vulnerability_id": "VCID-9313-wdbv-4yhb",
            "summary": "kernel: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53464.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53464.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53464",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53464"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53464",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53464"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400753",
                    "reference_id": "2400753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400753"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53464"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9313-wdbv-4yhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67800?format=api",
            "vulnerability_id": "VCID-93xh-fxzp-xqcj",
            "summary": "kernel: raw: Fix NULL deref in raw_get_next()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53198.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53198.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53198"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395229",
                    "reference_id": "2395229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395229"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53198"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-93xh-fxzp-xqcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67859?format=api",
            "vulnerability_id": "VCID-9932-jg75-m3ga",
            "summary": "kernel: wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50279.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50279.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04323",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04225",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04156",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50279"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395294",
                    "reference_id": "2395294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50279"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9932-jg75-m3ga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70722?format=api",
            "vulnerability_id": "VCID-99dh-ucyg-8khp",
            "summary": "kernel: powerpc/imc-pmu: Fix use of mutex in IRQs disabled section",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0586",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06081",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15176",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1498",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15087",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14988",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14886",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14893",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14948",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14986",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14989",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14931",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15108",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53031"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355516",
                    "reference_id": "2355516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355516"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53031"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99dh-ucyg-8khp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67033?format=api",
            "vulnerability_id": "VCID-9ea1-81c1-37g7",
            "summary": "kernel: netfilter: conntrack: fix wrong ct->timeout value",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53635.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53635.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53635"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53635"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402285",
                    "reference_id": "2402285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402285"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53635"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ea1-81c1-37g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70012?format=api",
            "vulnerability_id": "VCID-9gqs-b8tp-bbe9",
            "summary": "kernel: rethook: fix a potential memleak in rethook_alloc()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49795.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49795.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21987",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49795"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363386",
                    "reference_id": "2363386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49795"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gqs-b8tp-bbe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67334?format=api",
            "vulnerability_id": "VCID-9h4t-239c-73hy",
            "summary": "kernel: drm/radeon: free iio for atombios when driver shutdown",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53453.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53453.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53453"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400769",
                    "reference_id": "2400769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53453"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9h4t-239c-73hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67885?format=api",
            "vulnerability_id": "VCID-9mqz-3u9x-ybfg",
            "summary": "kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53232.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53232.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01134",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01118",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0159",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01599",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01596",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01611",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01595",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01499",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01487",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01503",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53232"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395322",
                    "reference_id": "2395322",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395322"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051",
                    "reference_id": "RHSA-2025:21051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083",
                    "reference_id": "RHSA-2025:21083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091",
                    "reference_id": "RHSA-2025:21091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128",
                    "reference_id": "RHSA-2025:21128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136",
                    "reference_id": "RHSA-2025:21136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22006",
                    "reference_id": "RHSA-2025:22006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22006"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53232"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mqz-3u9x-ybfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69255?format=api",
            "vulnerability_id": "VCID-9n5s-42gn-63f1",
            "summary": "kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06385",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06428",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06466",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06488",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19761",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19811",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19806",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19776",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19685",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50087"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373539",
                    "reference_id": "2373539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16919",
                    "reference_id": "RHSA-2025:16919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16920",
                    "reference_id": "RHSA-2025:16920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17570",
                    "reference_id": "RHSA-2025:17570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17570"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17734",
                    "reference_id": "RHSA-2025:17734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17735",
                    "reference_id": "RHSA-2025:17735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17735"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17958",
                    "reference_id": "RHSA-2025:17958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17958"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:18043",
                    "reference_id": "RHSA-2025:18043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:18043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:18054",
                    "reference_id": "RHSA-2025:18054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:18054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:18098",
                    "reference_id": "RHSA-2025:18098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:18098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:18281",
                    "reference_id": "RHSA-2025:18281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:18281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21112",
                    "reference_id": "RHSA-2025:21112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21667",
                    "reference_id": "RHSA-2025:21667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752",
                    "reference_id": "RHSA-2025:22752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22752"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50087"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5s-42gn-63f1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70654?format=api",
            "vulnerability_id": "VCID-9nqp-u6mk-9ycj",
            "summary": "kernel: Revert \"wifi: mac80211: fix memory leak in ieee80211_if_add()\"",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07395",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08656",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2003",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20168",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355440",
                    "reference_id": "2355440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355440"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/71e5cd1018d345e649e63f74a56c1897f99db7e9",
                    "reference_id": "71e5cd1018d345e649e63f74a56c1897f99db7e9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/71e5cd1018d345e649e63f74a56c1897f99db7e9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/80f8a66dede0a4b4e9e846765a97809c6fe49ce5",
                    "reference_id": "80f8a66dede0a4b4e9e846765a97809c6fe49ce5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/80f8a66dede0a4b4e9e846765a97809c6fe49ce5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/982c8b1e95c088f5d8f65967ec25be66e961401c",
                    "reference_id": "982c8b1e95c088f5d8f65967ec25be66e961401c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/982c8b1e95c088f5d8f65967ec25be66e961401c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/effecd8d116d3d3a28b4f628e61bba8d318fdfcf",
                    "reference_id": "effecd8d116d3d3a28b4f628e61bba8d318fdfcf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/effecd8d116d3d3a28b4f628e61bba8d318fdfcf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53028"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nqp-u6mk-9ycj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65395?format=api",
            "vulnerability_id": "VCID-9spm-xnwf-qqfr",
            "summary": "kernel: drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426172",
                    "reference_id": "2426172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50844"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9spm-xnwf-qqfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69817?format=api",
            "vulnerability_id": "VCID-9vwp-x5e6-5qdn",
            "summary": "kernel: scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53078.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53078.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363707",
                    "reference_id": "2363707",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363707"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53078"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9vwp-x5e6-5qdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67549?format=api",
            "vulnerability_id": "VCID-9wea-17un-53cv",
            "summary": "kernel: trace/blktrace: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53408.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53408.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04057",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53408"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396456",
                    "reference_id": "2396456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396456"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3036f5f5ae5210797d95446795df01c1249af9ad",
                    "reference_id": "3036f5f5ae5210797d95446795df01c1249af9ad",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:34Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3036f5f5ae5210797d95446795df01c1249af9ad"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5286b72fb425291af5f4ca7285d73c16a08d8691",
                    "reference_id": "5286b72fb425291af5f4ca7285d73c16a08d8691",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:34Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5286b72fb425291af5f4ca7285d73c16a08d8691"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/83e8864fee26f63a7435e941b7c36a20fd6fe93e",
                    "reference_id": "83e8864fee26f63a7435e941b7c36a20fd6fe93e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:34Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/83e8864fee26f63a7435e941b7c36a20fd6fe93e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a2e4b48d6f9b39aa19bafe223f9dd436a692fc80",
                    "reference_id": "a2e4b48d6f9b39aa19bafe223f9dd436a692fc80",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:34Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a2e4b48d6f9b39aa19bafe223f9dd436a692fc80"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53408"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wea-17un-53cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69881?format=api",
            "vulnerability_id": "VCID-9wns-7t95-afcb",
            "summary": "kernel: wifi: mt76: do not run mt76_unregister_device() on unregistered hw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53071"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363775",
                    "reference_id": "2363775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363775"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53071"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wns-7t95-afcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65599?format=api",
            "vulnerability_id": "VCID-9ybb-bzq2-cueb",
            "summary": "kernel: ceph: fix potential use-after-free bug when trimming caps",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53867.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53867.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424984",
                    "reference_id": "2424984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424984"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53867"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ybb-bzq2-cueb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67974?format=api",
            "vulnerability_id": "VCID-9yvr-y46y-6fff",
            "summary": "kernel: wifi: mac80211: fix memory leak in ieee80211_if_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50290.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50290.json"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395417",
                    "reference_id": "2395417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395417"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50290"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yvr-y46y-6fff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67316?format=api",
            "vulnerability_id": "VCID-9zx4-3gja-1bh2",
            "summary": "kernel: remoteproc: imx_dsp_rproc: Add mutex protection for workqueue",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50426.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50426.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50426"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400750",
                    "reference_id": "2400750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400750"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50426"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zx4-3gja-1bh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65479?format=api",
            "vulnerability_id": "VCID-a1gt-m5ms-8ucg",
            "summary": "kernel: wifi: fix potential NULL-ptr deref after clone",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50784.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50784.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50784"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426259",
                    "reference_id": "2426259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50784"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a1gt-m5ms-8ucg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67048?format=api",
            "vulnerability_id": "VCID-a2t1-qbac-e3ag",
            "summary": "kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50510.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50510.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50510",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50510"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50510",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50510"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402300",
                    "reference_id": "2402300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402300"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1988",
                    "reference_id": "RHSA-2022:1988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50510"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2t1-qbac-e3ag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78458?format=api",
            "vulnerability_id": "VCID-a2u7-uepg-jfa1",
            "summary": "kernel: gfs2: NULL pointer dereference in gfs2_evict_inode()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01721",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0173",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01729",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01732",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01741",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01727",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01718",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01717",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01705",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01706",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02117",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02125",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02093",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02143",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02097",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214348",
                    "reference_id": "2214348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214348"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6231-1/",
                    "reference_id": "USN-6231-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6231-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6339-1/",
                    "reference_id": "USN-6339-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6339-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6339-2/",
                    "reference_id": "USN-6339-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6339-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6339-3/",
                    "reference_id": "USN-6339-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6339-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6339-4/",
                    "reference_id": "USN-6339-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6339-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6350-1/",
                    "reference_id": "USN-6350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6351-1/",
                    "reference_id": "USN-6351-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6351-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6388-1/",
                    "reference_id": "USN-6388-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6388-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-1/",
                    "reference_id": "USN-6396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-2/",
                    "reference_id": "USN-6396-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-3/",
                    "reference_id": "USN-6396-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6417-1/",
                    "reference_id": "USN-6417-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6417-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3212"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2u7-uepg-jfa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69303?format=api",
            "vulnerability_id": "VCID-a4db-948v-e7b4",
            "summary": "kernel: regulator: of: Fix refcount leak bug in of_get_regulation_constraints()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50191.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50191.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06275",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06321",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06361",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06353",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06298",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50191"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50191"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373587",
                    "reference_id": "2373587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50191"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a4db-948v-e7b4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69408?format=api",
            "vulnerability_id": "VCID-a5ar-kua2-sqaj",
            "summary": "kernel: net: genl: fix error path memory leak in policy dumping",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50042.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50042.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06468",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0652",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50042"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691",
                    "reference_id": "2373691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4356",
                    "reference_id": "RHSA-2021:4356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50042"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ar-kua2-sqaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65393?format=api",
            "vulnerability_id": "VCID-a5e3-hqkq-63h3",
            "summary": "kernel: drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50847.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50847.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50847"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426170",
                    "reference_id": "2426170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426170"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50847"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5e3-hqkq-63h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69891?format=api",
            "vulnerability_id": "VCID-a5f4-nqzr-skha",
            "summary": "kernel: ext4: fix WARNING in ext4_update_inline_data",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53100.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53100.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20511",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20569",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20298",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20379",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20418",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20362",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20353",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20352",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20225",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20221",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20187",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20099",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20175",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53100"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363785",
                    "reference_id": "2363785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53100"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5f4-nqzr-skha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71685?format=api",
            "vulnerability_id": "VCID-a63b-cujw-q7d4",
            "summary": "kernel: dax: make sure inodes are flushed before destroy cache",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49220.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49220.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01342",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01352",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01356",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01348",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01276",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01281",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01267",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01256",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01269",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01344",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16388",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1645",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49220"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348260",
                    "reference_id": "2348260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348260"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49220"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a63b-cujw-q7d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65750?format=api",
            "vulnerability_id": "VCID-a6zq-5g9d-x7cg",
            "summary": "kernel: drm/amdkfd: Fix kernel warning during topology setup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54144.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54144.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54144"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425138",
                    "reference_id": "2425138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425138"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54144"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6zq-5g9d-x7cg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78440?format=api",
            "vulnerability_id": "VCID-a7kk-4q27-tkcf",
            "summary": "kernel: net: IPv6 RPL protocol reachable assertion leads to DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2156.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2156.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83966",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83992",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84014",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84007",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84004",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84028",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8403",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84057",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84063",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84066",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84088",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84111",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196292",
                    "reference_id": "2196292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6173-1/",
                    "reference_id": "USN-6173-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6173-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-1/",
                    "reference_id": "USN-6416-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-2/",
                    "reference_id": "USN-6416-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-3/",
                    "reference_id": "USN-6416-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-1/",
                    "reference_id": "USN-6445-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-2/",
                    "reference_id": "USN-6445-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-2156"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a7kk-4q27-tkcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67155?format=api",
            "vulnerability_id": "VCID-a7yt-qx7y-xfas",
            "summary": "kernel: ALSA: ymfpci: Fix BUG_ON in probe function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01976",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01989",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01988",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01973",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01968",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01949",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02019",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02045",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01951",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02035",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02906",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02885",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53607"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401517",
                    "reference_id": "2401517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4356",
                    "reference_id": "RHSA-2021:4356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53607"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a7yt-qx7y-xfas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72196?format=api",
            "vulnerability_id": "VCID-a97s-ex9t-rkc3",
            "summary": "kernel: drm/dp_mst: Fix resetting msg rx state after topology removal",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57876.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57876.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-57876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06419",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06454",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06443",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06492",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06534",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06521",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06511",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06444",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06455",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06604",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06618",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06634",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0663",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0665",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06778",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-57876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337142",
                    "reference_id": "2337142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8248",
                    "reference_id": "RHSA-2025:8248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8248"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-1/",
                    "reference_id": "USN-7379-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7379-2/",
                    "reference_id": "USN-7379-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7379-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7380-1/",
                    "reference_id": "USN-7380-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7380-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7381-1/",
                    "reference_id": "USN-7381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7381-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7382-1/",
                    "reference_id": "USN-7382-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7382-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7449-1/",
                    "reference_id": "USN-7449-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7449-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7449-2/",
                    "reference_id": "USN-7449-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7449-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7450-1/",
                    "reference_id": "USN-7450-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7450-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7451-1/",
                    "reference_id": "USN-7451-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7451-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7452-1/",
                    "reference_id": "USN-7452-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7452-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7453-1/",
                    "reference_id": "USN-7453-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7453-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7468-1/",
                    "reference_id": "USN-7468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7468-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7523-1/",
                    "reference_id": "USN-7523-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7523-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7524-1/",
                    "reference_id": "USN-7524-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7524-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2024-57876"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a97s-ex9t-rkc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65374?format=api",
            "vulnerability_id": "VCID-afwb-6d63-qbbq",
            "summary": "kernel: drm/virtio: Check whether transferred 2D BO is shmem",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426151",
                    "reference_id": "2426151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50842"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afwb-6d63-qbbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70700?format=api",
            "vulnerability_id": "VCID-ag6x-k7xd-tueu",
            "summary": "kernel: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52993.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52993.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0538",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05454",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0541",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05452",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05473",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05444",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05424",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05379",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05382",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05546",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05581",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05617",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05618",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08241",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0b08201158f177aab469e356b4d6af24fdd118df",
                    "reference_id": "0b08201158f177aab469e356b4d6af24fdd118df",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0b08201158f177aab469e356b4d6af24fdd118df"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/137f1b47da5f58805da42c1b7811e28c1e353f39",
                    "reference_id": "137f1b47da5f58805da42c1b7811e28c1e353f39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/137f1b47da5f58805da42c1b7811e28c1e353f39"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355492",
                    "reference_id": "2355492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355492"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/496975d1a2937f4baadf3d985991b13fc4fc4f27",
                    "reference_id": "496975d1a2937f4baadf3d985991b13fc4fc4f27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/496975d1a2937f4baadf3d985991b13fc4fc4f27"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5fa55950729d0762a787451dc52862c3f850f859",
                    "reference_id": "5fa55950729d0762a787451dc52862c3f850f859",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5fa55950729d0762a787451dc52862c3f850f859"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/744fe9be9665227335539b7a77ece8d9ff62b6c0",
                    "reference_id": "744fe9be9665227335539b7a77ece8d9ff62b6c0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/744fe9be9665227335539b7a77ece8d9ff62b6c0"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8770cd9d7c14aa99c255a0d08186f0be953e1638",
                    "reference_id": "8770cd9d7c14aa99c255a0d08186f0be953e1638",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8770cd9d7c14aa99c255a0d08186f0be953e1638"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e284c273dbb4c1ed68d4204bff94d0b10e4a90f5",
                    "reference_id": "e284c273dbb4c1ed68d4204bff94d0b10e4a90f5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e284c273dbb4c1ed68d4204bff94d0b10e4a90f5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3421",
                    "reference_id": "RHSA-2024:3421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3421"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52993"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ag6x-k7xd-tueu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67017?format=api",
            "vulnerability_id": "VCID-an95-d2f9-wkbc",
            "summary": "kernel: md: fix soft lockup in status_resync",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01008",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01016",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01021",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01004",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01003",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01062",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01064",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01228",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01221",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402268",
                    "reference_id": "2402268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53620"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-an95-d2f9-wkbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67912?format=api",
            "vulnerability_id": "VCID-ap8e-kz9r-6qf9",
            "summary": "kernel: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03717",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03649",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50272"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395349",
                    "reference_id": "2395349",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50272"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap8e-kz9r-6qf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66121?format=api",
            "vulnerability_id": "VCID-apj2-9k7k-tbgq",
            "summary": "kernel: drm/amd/display: fix FCLK pstate change underflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53780"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53780"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420287",
                    "reference_id": "2420287",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420287"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53780"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apj2-9k7k-tbgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69859?format=api",
            "vulnerability_id": "VCID-aq8d-xzc4-uqbf",
            "summary": "kernel: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19794",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19928",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19937",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19835",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19812",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19816",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19827",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19716",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19577",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19662",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53077"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363752",
                    "reference_id": "2363752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53077"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aq8d-xzc4-uqbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70672?format=api",
            "vulnerability_id": "VCID-avbq-ww24-syb1",
            "summary": "kernel: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08667",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08769",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08732",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08763",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08774",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08729",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0862",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08609",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00369",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0055",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53024"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355458",
                    "reference_id": "2355458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53024"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-avbq-ww24-syb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69814?format=api",
            "vulnerability_id": "VCID-ayvw-vpty-dbgv",
            "summary": "kernel: perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53065.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53065.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19794",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19928",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19937",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19835",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19812",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19816",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19827",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19716",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19577",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19662",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53065"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363704",
                    "reference_id": "2363704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53065"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayvw-vpty-dbgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65348?format=api",
            "vulnerability_id": "VCID-aze6-wgfm-3ycv",
            "summary": "kernel: ASoC: SOF: avoid a NULL dereference with unsupported widgets",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54233.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54233.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54233"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426124",
                    "reference_id": "2426124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426124"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54233"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aze6-wgfm-3ycv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67871?format=api",
            "vulnerability_id": "VCID-b2k9-sds1-zkcv",
            "summary": "kernel: nfsd: call op_release, even when op_func returns an error",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0411",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04005",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0396",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03972",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04128",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810",
                    "reference_id": "15a8b55dbb1ba154d82627547c5761cac884d810",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395306",
                    "reference_id": "2395306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395306"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae",
                    "reference_id": "3d0dcada384af22dec764c8374a2997870ec86ae",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570",
                    "reference_id": "65a33135e91e6dd661ecdf1194b9d90c49ae3570",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3",
                    "reference_id": "b11d8162c24af4a351d21e2c804d25ca493305e3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3",
                    "reference_id": "b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53241"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k9-sds1-zkcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67044?format=api",
            "vulnerability_id": "VCID-b8wn-e4jg-gyap",
            "summary": "kernel: net/sched: sch_fq: fix integer overflow of \"credit\"",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03396",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402296",
                    "reference_id": "2402296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53624"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8wn-e4jg-gyap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65649?format=api",
            "vulnerability_id": "VCID-bhu1-6xny-ayfk",
            "summary": "kernel: devlink: hold region lock when flushing snapshots",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50712"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425036",
                    "reference_id": "2425036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50712"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhu1-6xny-ayfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70736?format=api",
            "vulnerability_id": "VCID-bjwy-ab6s-e7hm",
            "summary": "kernel: thermal: core: call put_device() only after device_register() fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53012.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53012.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0524",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05296",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05263",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05374",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05416",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05414",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05181",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05184",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05611",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.229",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22985",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53012"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355531",
                    "reference_id": "2355531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355531"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53012"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjwy-ab6s-e7hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78325?format=api",
            "vulnerability_id": "VCID-bksk-nfhx-k7dw",
            "summary": "Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35829",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35756",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35807",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35837",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35797",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35774",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35814",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35802",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35886",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36019",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35933",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35817",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3605",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36282",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36458",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217523",
                    "reference_id": "2217523",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:10Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217523"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-3640",
                    "reference_id": "CVE-2023-3640",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-3640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3640"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bksk-nfhx-k7dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65702?format=api",
            "vulnerability_id": "VCID-bn8r-uwxn-buan",
            "summary": "kernel: octeontx2-af: Add validation for lmac type",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54129.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54129"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54129"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425090",
                    "reference_id": "2425090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425090"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54129"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bn8r-uwxn-buan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65770?format=api",
            "vulnerability_id": "VCID-bnwu-jnuq-yyfn",
            "summary": "kernel: Linux kernel: Denial of Service due to memory leak in netdevsim",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50772.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50772.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50772"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50772"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425158",
                    "reference_id": "2425158",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425158"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50772"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnwu-jnuq-yyfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66270?format=api",
            "vulnerability_id": "VCID-bq3e-15cq-u3f5",
            "summary": "kernel: drm/gud: Fix UBSAN warning",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50628.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50628.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50628"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419904",
                    "reference_id": "2419904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419904"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50628"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq3e-15cq-u3f5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70657?format=api",
            "vulnerability_id": "VCID-bq5f-5fgb-nffb",
            "summary": "kernel: bpf: Skip invalid kfunc call in backtrack_insn",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52928.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52928.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01909",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0524",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05296",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05263",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05181",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05184",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05338",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05374",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05416",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05414",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14854",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52928"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355443",
                    "reference_id": "2355443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52928"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq5f-5fgb-nffb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69364?format=api",
            "vulnerability_id": "VCID-bqhk-aq97-5qh7",
            "summary": "kernel: cifs: Fix memory leak on the deferred close",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04693",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04751",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04784",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04796",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04788",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373647",
                    "reference_id": "2373647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50076"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqhk-aq97-5qh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65646?format=api",
            "vulnerability_id": "VCID-brev-vkyg-g7ev",
            "summary": "kernel: Linux kernel: Memory leak in RDMA/irdma subsystem leads to Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54055.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54055.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54055"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425033",
                    "reference_id": "2425033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425033"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54055"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brev-vkyg-g7ev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67335?format=api",
            "vulnerability_id": "VCID-brwa-m98a-6qcx",
            "summary": "kernel: Linux kernel: Denial of Service due to file descriptor leak in io_uring with ocfs2",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53511.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53511.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53511"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400770",
                    "reference_id": "2400770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53511"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brwa-m98a-6qcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78966?format=api",
            "vulnerability_id": "VCID-brwq-qcbd-c3ep",
            "summary": "kernel: x86/mm: Randomize per-cpu entry area",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05278",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05194",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05237",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05239",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05227",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05081",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05104",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05086",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0507",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05016",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05022",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/28/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/28/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165926",
                    "reference_id": "2165926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165926"
                },
                {
                    "reference_url": "https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80",
                    "reference_id": "97e3d26b5e5f371b3ee223d94dd123e6c442ba80",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10262",
                    "reference_id": "RHSA-2024:10262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10262"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10772",
                    "reference_id": "RHSA-2024:10772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10773",
                    "reference_id": "RHSA-2024:10773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10773"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1188",
                    "reference_id": "RHSA-2024:1188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1188"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6206-1/",
                    "reference_id": "USN-6206-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6206-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6235-1/",
                    "reference_id": "USN-6235-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6235-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-1/",
                    "reference_id": "USN-6440-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-2/",
                    "reference_id": "USN-6440-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-3/",
                    "reference_id": "USN-6440-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6462-1/",
                    "reference_id": "USN-6462-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6462-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6462-2/",
                    "reference_id": "USN-6462-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6462-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-0597"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brwq-qcbd-c3ep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70713?format=api",
            "vulnerability_id": "VCID-bu5s-venv-j3dw",
            "summary": "kernel: bnxt: Do not read past the end of test names",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53010.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53010.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04513",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25287",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25104",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25219",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25233",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25138",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25148",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25106",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25035",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2499",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29099",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53010"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53010"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355506",
                    "reference_id": "2355506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53010"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bu5s-venv-j3dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69837?format=api",
            "vulnerability_id": "VCID-bvh6-bz52-sfcb",
            "summary": "kernel: scsi: qla2xxx: Synchronize the IOCB count to be in order",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53056.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53056.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2003",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20168",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53056"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363729",
                    "reference_id": "2363729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53056"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bvh6-bz52-sfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67108?format=api",
            "vulnerability_id": "VCID-c33u-c92y-8beg",
            "summary": "kernel: rtc: class: Fix potential memleak in devm_rtc_allocate_device()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50477"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401470",
                    "reference_id": "2401470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401470"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50477"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c33u-c92y-8beg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65366?format=api",
            "vulnerability_id": "VCID-c4uq-rfmc-fugt",
            "summary": "kernel: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50819.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50819.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426143",
                    "reference_id": "2426143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50819"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4uq-rfmc-fugt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67969?format=api",
            "vulnerability_id": "VCID-c55k-x8eu-r3ay",
            "summary": "kernel: wifi: ath9k: verify the expected usb_endpoints are present",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50297.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50297.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03717",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03649",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50297"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395412",
                    "reference_id": "2395412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50297"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c55k-x8eu-r3ay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69103?format=api",
            "vulnerability_id": "VCID-c688-u4mw-pyc5",
            "summary": "kernel: cifs: fix small mempool leak in SMB2_negotiate()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49938.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49938.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49938",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03513",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03514",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03492",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03464",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03439",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12716",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12687",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12694",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12816",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12779",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12672",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12579",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49938"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49938",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49938"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373401",
                    "reference_id": "2373401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49938"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c688-u4mw-pyc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70125?format=api",
            "vulnerability_id": "VCID-c8ad-ma5z-yqad",
            "summary": "kernel: drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49864.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49864.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12917",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12716",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12687",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12694",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12816",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12779",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12672",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12579",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12966",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12768",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12847",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12865",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12782",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49864"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363495",
                    "reference_id": "2363495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363495"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3c1bb6187e566143f15dbf0367ae671584aead5b",
                    "reference_id": "3c1bb6187e566143f15dbf0367ae671584aead5b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3c1bb6187e566143f15dbf0367ae671584aead5b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5b994354af3cab770bf13386469c5725713679af",
                    "reference_id": "5b994354af3cab770bf13386469c5725713679af",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5b994354af3cab770bf13386469c5725713679af"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/613d5a9a440828970f1543b962779401ac2c9c62",
                    "reference_id": "613d5a9a440828970f1543b962779401ac2c9c62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/613d5a9a440828970f1543b962779401ac2c9c62"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49864"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8ad-ma5z-yqad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71529?format=api",
            "vulnerability_id": "VCID-c8rj-qvep-nydc",
            "summary": "kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49339.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49339.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10422",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1049",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26161",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26124",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26065",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26069",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26047",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26013",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25953",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25949",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.259",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25792",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25848",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26112",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49339"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49339"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348103",
                    "reference_id": "2348103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49339"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8rj-qvep-nydc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67999?format=api",
            "vulnerability_id": "VCID-cadg-9afp-afee",
            "summary": "kernel: usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50246.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50246.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50246"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50246"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395442",
                    "reference_id": "2395442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395442"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50246"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cadg-9afp-afee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66825?format=api",
            "vulnerability_id": "VCID-ce3z-xvkk-3yge",
            "summary": "kernel: regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50558.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50558.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06382",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06419",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06462",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06439",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0638",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06538",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06569",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06574",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06595",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06724",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50558"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405782",
                    "reference_id": "2405782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50558"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce3z-xvkk-3yge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78214?format=api",
            "vulnerability_id": "VCID-cf2b-yvwj-wyh1",
            "summary": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01885",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01864",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01846",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01845",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01931",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02119",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02073",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0207",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02098",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02092",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00715",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00705",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00713",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00714",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4155"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802",
                    "reference_id": "2213802",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4155",
                    "reference_id": "CVE-2023-4155",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4155"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3859",
                    "reference_id": "RHSA-2024:3859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3859"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740",
                    "reference_id": "RHSA-2024:4740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4740"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6343-1/",
                    "reference_id": "USN-6343-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6343-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-1/",
                    "reference_id": "USN-6416-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-2/",
                    "reference_id": "USN-6416-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-3/",
                    "reference_id": "USN-6416-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-1/",
                    "reference_id": "USN-6445-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-2/",
                    "reference_id": "USN-6445-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4155"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2b-yvwj-wyh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66770?format=api",
            "vulnerability_id": "VCID-chgj-ebyf-gqfs",
            "summary": "kernel: Linux kernel: Memory leak in __class_register()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16907",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16964",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16747",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16834",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16867",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16705",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1674",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16646",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16635",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.166",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16468",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16588",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50578"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405724",
                    "reference_id": "2405724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50578"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chgj-ebyf-gqfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69795?format=api",
            "vulnerability_id": "VCID-chuj-26tz-gfae",
            "summary": "kernel: ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53070"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363685",
                    "reference_id": "2363685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363685"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53070"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-26tz-gfae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67973?format=api",
            "vulnerability_id": "VCID-cm4u-6g3p-3ufh",
            "summary": "kernel: net: openvswitch: fix race on port output",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53188.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53188.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01484",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01486",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0147",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01473",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01479",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02229",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02208",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02198",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02233",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02193",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02196",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02159",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02132",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02144",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53188"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395416",
                    "reference_id": "2395416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395416"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53188"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cm4u-6g3p-3ufh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69871?format=api",
            "vulnerability_id": "VCID-cp68-9nq9-tyhk",
            "summary": "kernel: interconnect: fix mem leak when freeing nodes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53096"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363764",
                    "reference_id": "2363764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363764"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53096"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cp68-9nq9-tyhk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78991?format=api",
            "vulnerability_id": "VCID-cs99-jacq-qkey",
            "summary": "kernel: use-after-free in l1oip timer handlers",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06992",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06801",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06808",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06826",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.068",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06838",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06626",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06734",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06725",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06717",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06654",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06645",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3565"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150953",
                    "reference_id": "2150953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150953"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2834",
                    "reference_id": "AVG-2834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2835",
                    "reference_id": "AVG-2835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2835"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2836",
                    "reference_id": "AVG-2836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2836"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2837",
                    "reference_id": "AVG-2837",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950",
                    "reference_id": "RHSA-2024:2950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5754-1/",
                    "reference_id": "USN-5754-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5754-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5754-2/",
                    "reference_id": "USN-5754-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5754-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5755-1/",
                    "reference_id": "USN-5755-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5755-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5755-2/",
                    "reference_id": "USN-5755-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5755-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-1/",
                    "reference_id": "USN-5756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-2/",
                    "reference_id": "USN-5756-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-3/",
                    "reference_id": "USN-5756-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5757-1/",
                    "reference_id": "USN-5757-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5757-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5757-2/",
                    "reference_id": "USN-5757-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5757-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5758-1/",
                    "reference_id": "USN-5758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5774-1/",
                    "reference_id": "USN-5774-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5774-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5779-1/",
                    "reference_id": "USN-5779-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5779-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5913-1/",
                    "reference_id": "USN-5913-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5913-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-3565"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cs99-jacq-qkey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66761?format=api",
            "vulnerability_id": "VCID-czue-c27z-bkgp",
            "summary": "kernel: mm/vmemmap/devdax: fix kernel crash when probing devdax devices",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53706.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53706.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07245",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07288",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07352",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07339",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07259",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07253",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0738",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07347",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0732",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07336",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07485",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53706"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405714",
                    "reference_id": "2405714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53706"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czue-c27z-bkgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65821?format=api",
            "vulnerability_id": "VCID-d3ce-dt25-3yd1",
            "summary": "kernel: nvme-pci: fix mempool alloc size",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50756.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50756.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50756"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425209",
                    "reference_id": "2425209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425209"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50756"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ce-dt25-3yd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66781?format=api",
            "vulnerability_id": "VCID-d6ux-y5jf-pkgb",
            "summary": "kernel: regulator: core: Prevent integer underflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50582.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50582.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08409",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08461",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08382",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08471",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08306",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08433",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08364",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08317",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08459",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50582"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405735",
                    "reference_id": "2405735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405735"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50582"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d6ux-y5jf-pkgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66273?format=api",
            "vulnerability_id": "VCID-dbp3-snpt-bfh9",
            "summary": "kernel: wifi: ath11k: fix monitor mode bringup crash",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50627"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50627"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419908",
                    "reference_id": "2419908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419908"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50627"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dbp3-snpt-bfh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67275?format=api",
            "vulnerability_id": "VCID-dcyy-895z-syd7",
            "summary": "kernel: clk: tegra20: Fix refcount leak in tegra20_clock_init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50444.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50444.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50444"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50444"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400708",
                    "reference_id": "2400708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50444"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyy-895z-syd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67128?format=api",
            "vulnerability_id": "VCID-deyn-mmwk-7qhq",
            "summary": "kernel: scsi: Revert \"scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed\"",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53609.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53609.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0477",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04951",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04957",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04731",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04875",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53609"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401490",
                    "reference_id": "2401490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53609"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-deyn-mmwk-7qhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67995?format=api",
            "vulnerability_id": "VCID-dh34-eegq-suf2",
            "summary": "kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50327.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50327.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05769",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05795",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05695",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05729",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06768",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06777",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06797",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0677",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06809",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0696",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06702",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06696",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06619",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06612",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50327"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395438",
                    "reference_id": "2395438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7909-1/",
                    "reference_id": "USN-7909-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7909-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7909-2/",
                    "reference_id": "USN-7909-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7909-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7909-3/",
                    "reference_id": "USN-7909-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7909-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7909-4/",
                    "reference_id": "USN-7909-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7909-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7909-5/",
                    "reference_id": "USN-7909-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7909-5/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7910-1/",
                    "reference_id": "USN-7910-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7910-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7910-2/",
                    "reference_id": "USN-7910-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7910-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7933-1/",
                    "reference_id": "USN-7933-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7933-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7938-1/",
                    "reference_id": "USN-7938-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7938-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50327"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dh34-eegq-suf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67622?format=api",
            "vulnerability_id": "VCID-dhhp-d1k5-rqea",
            "summary": "kernel: cifs: Fix memory leak when build ntlmssp negotiate blob failed",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05469",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05288",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05388",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50372"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396108",
                    "reference_id": "2396108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396108"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/30b2d7f8f13664655480d6af45f60270b3eb6736",
                    "reference_id": "30b2d7f8f13664655480d6af45f60270b3eb6736",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:36:31Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/30b2d7f8f13664655480d6af45f60270b3eb6736"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fa5a70bdd5e565c8696fb04dfe18a4e8aff4695d",
                    "reference_id": "fa5a70bdd5e565c8696fb04dfe18a4e8aff4695d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:36:31Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fa5a70bdd5e565c8696fb04dfe18a4e8aff4695d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101",
                    "reference_id": "RHSA-2024:5101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5101"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50372"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dhhp-d1k5-rqea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65406?format=api",
            "vulnerability_id": "VCID-djnk-z5ny-97hm",
            "summary": "kernel: media: uvcvideo: Fix memory leak in uvc_gpio_parse",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50882.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50882.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50882"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426184",
                    "reference_id": "2426184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50882"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-djnk-z5ny-97hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67835?format=api",
            "vulnerability_id": "VCID-dkpb-6kwe-j7b1",
            "summary": "kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53213.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53213.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02224",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02289",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02313",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02181",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02177",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02155",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02166",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02233",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02225",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0222",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53213"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0da40e018fd034d87c9460123fa7f897b69fdee7",
                    "reference_id": "0da40e018fd034d87c9460123fa7f897b69fdee7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0da40e018fd034d87c9460123fa7f897b69fdee7"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/21bee3e649d87f78fe8aef6ae02edd3d6f310fd0",
                    "reference_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/21bee3e649d87f78fe8aef6ae02edd3d6f310fd0"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/228186629ea970cc78b7d7d5f593f2d32fddf9f6",
                    "reference_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/228186629ea970cc78b7d7d5f593f2d32fddf9f6"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395267",
                    "reference_id": "2395267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395267"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/39f9bd880abac6068bedb24a4e16e7bd26bf92da",
                    "reference_id": "39f9bd880abac6068bedb24a4e16e7bd26bf92da",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/39f9bd880abac6068bedb24a4e16e7bd26bf92da"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/425eea395f1f5ae349fb55f7fe51d833a5324bfe",
                    "reference_id": "425eea395f1f5ae349fb55f7fe51d833a5324bfe",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/425eea395f1f5ae349fb55f7fe51d833a5324bfe"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/549825602e3e6449927ca1ea1a08fd89868439df",
                    "reference_id": "549825602e3e6449927ca1ea1a08fd89868439df",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/549825602e3e6449927ca1ea1a08fd89868439df"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8",
                    "reference_id": "936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ac5305e5d227b9af3aae25fa83380d3ff0225b73",
                    "reference_id": "ac5305e5d227b9af3aae25fa83380d3ff0225b73",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ac5305e5d227b9af3aae25fa83380d3ff0225b73"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e29661611e6e71027159a3140e818ef3b99f32dd",
                    "reference_id": "e29661611e6e71027159a3140e818ef3b99f32dd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e29661611e6e71027159a3140e818ef3b99f32dd"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051",
                    "reference_id": "RHSA-2025:21051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083",
                    "reference_id": "RHSA-2025:21083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21084",
                    "reference_id": "RHSA-2025:21084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091",
                    "reference_id": "RHSA-2025:21091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128",
                    "reference_id": "RHSA-2025:21128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136",
                    "reference_id": "RHSA-2025:21136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752",
                    "reference_id": "RHSA-2025:22752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445",
                    "reference_id": "RHSA-2025:23445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23445"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53213"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dkpb-6kwe-j7b1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67116?format=api",
            "vulnerability_id": "VCID-dm3r-us9z-5uc3",
            "summary": "kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53556"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401478",
                    "reference_id": "2401478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069",
                    "reference_id": "RHSA-2023:5069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5069"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627",
                    "reference_id": "RHSA-2023:5627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5627"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53556"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm3r-us9z-5uc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65468?format=api",
            "vulnerability_id": "VCID-dmh2-skzm-d3bx",
            "summary": "kernel: net: tls: avoid hanging tasks on the tx_lock",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54306.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54306.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54306"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54306"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426248",
                    "reference_id": "2426248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426248"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54306"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmh2-skzm-d3bx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67175?format=api",
            "vulnerability_id": "VCID-dpah-3hkx-rbbu",
            "summary": "kernel: drm/amd: fix potential memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0477",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04951",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04957",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04731",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04875",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50479"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401537",
                    "reference_id": "2401537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50479"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dpah-3hkx-rbbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65392?format=api",
            "vulnerability_id": "VCID-dxsa-srum-pkcy",
            "summary": "kernel: Linux kernel: netfilter use-after-free vulnerability leading to denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54200.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54200.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54200"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426169",
                    "reference_id": "2426169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426169"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54200"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsa-srum-pkcy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67619?format=api",
            "vulnerability_id": "VCID-e11b-m9g4-vfhu",
            "summary": "kernel: usb: dwc3: core: fix some leaks in probe",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50357.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50357.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50357"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396105",
                    "reference_id": "2396105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396105"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2a735e4b5580a2a6bbd6572109b4c4f163c57462",
                    "reference_id": "2a735e4b5580a2a6bbd6572109b4c4f163c57462",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2a735e4b5580a2a6bbd6572109b4c4f163c57462"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3a213503f483173e7eea76f2e7e3bdd6df7fd6f8",
                    "reference_id": "3a213503f483173e7eea76f2e7e3bdd6df7fd6f8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3a213503f483173e7eea76f2e7e3bdd6df7fd6f8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/79c3afb55942368921237d7b5355d48c52bdde20",
                    "reference_id": "79c3afb55942368921237d7b5355d48c52bdde20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/79c3afb55942368921237d7b5355d48c52bdde20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50357"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e11b-m9g4-vfhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65362?format=api",
            "vulnerability_id": "VCID-e227-daq9-ufa8",
            "summary": "kernel: driver core: fix potential null-ptr-deref in device_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06941",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07022",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07015",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07056",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0706",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07021",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06954",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07071",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09524",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426138",
                    "reference_id": "2426138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426138"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54321"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e227-daq9-ufa8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67892?format=api",
            "vulnerability_id": "VCID-e3ee-4spd-83fc",
            "summary": "kernel: usb: ucsi_acpi: Increase the command completion timeout",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53168.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53168.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53168"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395329",
                    "reference_id": "2395329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53168"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3ee-4spd-83fc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66969?format=api",
            "vulnerability_id": "VCID-e5jb-59g6-zbdm",
            "summary": "kernel: drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50520.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50520.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50520"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50520"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402219",
                    "reference_id": "2402219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50520"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5jb-59g6-zbdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69873?format=api",
            "vulnerability_id": "VCID-e7mz-znzm-5yf1",
            "summary": "kernel: mptcp: fix UaF in listener shutdown",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53088.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53088.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16114",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16132",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1617",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15899",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16012",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53088"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363766",
                    "reference_id": "2363766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53088"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7mz-znzm-5yf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66974?format=api",
            "vulnerability_id": "VCID-ea53-utnw-w7dq",
            "summary": "kernel: tcp: fix skb_copy_ubufs() vs BIG TCP",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53669"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402224",
                    "reference_id": "2402224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402224"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53669"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ea53-utnw-w7dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70660?format=api",
            "vulnerability_id": "VCID-eayn-q4ht-hya5",
            "summary": "kernel: NFSD: fix use-after-free in nfsd4_ssc_setup_dul()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53025.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53025.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355446",
                    "reference_id": "2355446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53025"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eayn-q4ht-hya5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78602?format=api",
            "vulnerability_id": "VCID-ebxk-u1b1-zybq",
            "summary": "kernel: use-after-free bug in remove function xgene_hwmon_remove",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02657",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0269",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0267",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02688",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02666",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02647",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02655",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02767",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04025",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03983",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03999",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03976",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03979",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1855"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/",
                    "reference_id": "20230318122758.2140868-1-linux%40roeck-us.net",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"
                        }
                    ],
                    "url": "https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184578",
                    "reference_id": "2184578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184578"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1",
                    "reference_id": "cb090e64cf25602b9adaf32d5dfc9c8bec493cd1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6175-1/",
                    "reference_id": "USN-6175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6186-1/",
                    "reference_id": "USN-6186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6186-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6284-1/",
                    "reference_id": "USN-6284-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6284-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6301-1/",
                    "reference_id": "USN-6301-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6301-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6312-1/",
                    "reference_id": "USN-6312-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6312-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6314-1/",
                    "reference_id": "USN-6314-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6314-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6337-1/",
                    "reference_id": "USN-6337-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6337-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1855"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebxk-u1b1-zybq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78996?format=api",
            "vulnerability_id": "VCID-egud-t61c-k3g7",
            "summary": "Kernel: race when faulting a device private page in memory manager",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3523.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3523.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3523",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29861",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29915",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29957",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2991",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29878",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30009",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29873",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30449",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30495",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29943",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30263",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.302",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30084",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3523"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3523",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3523"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143906",
                    "reference_id": "2143906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143906"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-3523"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-egud-t61c-k3g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70694?format=api",
            "vulnerability_id": "VCID-eht6-eypr-2ybf",
            "summary": "kernel: perf/x86/amd: fix potential integer overflow on shift of a int",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49748.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49748.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01991",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01999",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06832",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06951",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06949",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06987",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0699",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06955",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06881",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06865",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49748"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/08245672cdc6505550d1a5020603b0a8d4a6dcc7",
                    "reference_id": "08245672cdc6505550d1a5020603b0a8d4a6dcc7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/08245672cdc6505550d1a5020603b0a8d4a6dcc7"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/14cc13e433e1067557435b1adbf05608d7d47a93",
                    "reference_id": "14cc13e433e1067557435b1adbf05608d7d47a93",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/14cc13e433e1067557435b1adbf05608d7d47a93"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355486",
                    "reference_id": "2355486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355486"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a4d01fb87ece45d4164fd725890211ccf9a307a9",
                    "reference_id": "a4d01fb87ece45d4164fd725890211ccf9a307a9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a4d01fb87ece45d4164fd725890211ccf9a307a9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f84c9b72fb200633774704d8020f769c88a4b249",
                    "reference_id": "f84c9b72fb200633774704d8020f769c88a4b249",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f84c9b72fb200633774704d8020f769c88a4b249"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fbf7b0e4cef3b5470b610f14fb9faa5ee7f63954",
                    "reference_id": "fbf7b0e4cef3b5470b610f14fb9faa5ee7f63954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fbf7b0e4cef3b5470b610f14fb9faa5ee7f63954"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49748"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eht6-eypr-2ybf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67508?format=api",
            "vulnerability_id": "VCID-ejcf-us8y-6fgn",
            "summary": "kernel: mm/mempolicy: fix memory leak in set_mempolicy_home_node system call",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50391.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50391.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50391"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0ce4cc6d269ddc448a825955b495f662f5d9e153",
                    "reference_id": "0ce4cc6d269ddc448a825955b495f662f5d9e153",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0ce4cc6d269ddc448a825955b495f662f5d9e153"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396395",
                    "reference_id": "2396395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396395"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76",
                    "reference_id": "38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4ca0eb6b2f3add8c5daefb726ce57dc95d103d33",
                    "reference_id": "4ca0eb6b2f3add8c5daefb726ce57dc95d103d33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4ca0eb6b2f3add8c5daefb726ce57dc95d103d33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50391"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejcf-us8y-6fgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71140?format=api",
            "vulnerability_id": "VCID-ejqx-3s8b-5kgs",
            "summary": "kernel: watch_queue: Actually free the watch",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49256.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49256.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10417",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2985",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29859",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29814",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29763",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29782",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29761",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29717",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29637",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29523",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2946",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29314",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29376",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29753",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29815",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49256"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49256"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347705",
                    "reference_id": "2347705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347705"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49256"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejqx-3s8b-5kgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69870?format=api",
            "vulnerability_id": "VCID-ejyf-shw6-ubgv",
            "summary": "kernel: nvmet: avoid potential UAF in nvmet_req_complete()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53116.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53116.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19884",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19963",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20036",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19991",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19811",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19806",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19776",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19685",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19761",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53116"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363763",
                    "reference_id": "2363763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53116"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejyf-shw6-ubgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67037?format=api",
            "vulnerability_id": "VCID-emkv-9fnu-5kc5",
            "summary": "kernel: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02326",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02333",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02355",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02332",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02318",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02316",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02384",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02373",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02426",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.023",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02306",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02675",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03385",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03403",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53623"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402289",
                    "reference_id": "2402289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53623"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-emkv-9fnu-5kc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65426?format=api",
            "vulnerability_id": "VCID-eptr-aay5-ybh2",
            "summary": "kernel: bpf: Prevent decl_tag from being referenced in func_proto arg",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50883.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50883.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50883"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426204",
                    "reference_id": "2426204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50883"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eptr-aay5-ybh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67367?format=api",
            "vulnerability_id": "VCID-epug-24vn-v7ht",
            "summary": "kernel: ipv6: Add lwtunnel encap size of all siblings in nexthop calculation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53477"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400802",
                    "reference_id": "2400802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400802"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53477"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epug-24vn-v7ht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66231?format=api",
            "vulnerability_id": "VCID-epus-vfcr-qkav",
            "summary": "kernel: mm: hugetlb: fix UAF in hugetlb_handle_userfault",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50630.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50630.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06165",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10305",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10119",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10098",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10211",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50630"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50630"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419847",
                    "reference_id": "2419847",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419847"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50630"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epus-vfcr-qkav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67190?format=api",
            "vulnerability_id": "VCID-etbt-qgzf-8yff",
            "summary": "kernel: HID: hyperv: avoid struct memcpy overrun warning",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53553.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53553.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0477",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04951",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04957",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04731",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04875",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53553"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401552",
                    "reference_id": "2401552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401552"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53553"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-etbt-qgzf-8yff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67774?format=api",
            "vulnerability_id": "VCID-ev7d-1r9d-ekew",
            "summary": "kernel: floppy: Fix memory leak in do_floppy_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50342.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50342.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04278",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50342"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395876",
                    "reference_id": "2395876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395876"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/55b3c66a0d441cd37154ae95e44d0b82ccfd580e",
                    "reference_id": "55b3c66a0d441cd37154ae95e44d0b82ccfd580e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/55b3c66a0d441cd37154ae95e44d0b82ccfd580e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/75d8c8851a4da0190c2480e84315b5fd3d0356c5",
                    "reference_id": "75d8c8851a4da0190c2480e84315b5fd3d0356c5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/75d8c8851a4da0190c2480e84315b5fd3d0356c5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f36d8c8651506aea5f09899f5356ece5d1384f50",
                    "reference_id": "f36d8c8651506aea5f09899f5356ece5d1384f50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f36d8c8651506aea5f09899f5356ece5d1384f50"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f8ace2e304c5dd8a7328db9cd2b8a4b1b98d83ec",
                    "reference_id": "f8ace2e304c5dd8a7328db9cd2b8a4b1b98d83ec",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f8ace2e304c5dd8a7328db9cd2b8a4b1b98d83ec"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50342"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ev7d-1r9d-ekew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70698?format=api",
            "vulnerability_id": "VCID-exy4-ah1b-cfbw",
            "summary": "kernel: bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52986.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52986.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05913",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05947",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05937",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05995",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05987",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06127",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06158",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06167",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05942",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05953",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06105",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10873",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1101",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52986"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52986"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355490",
                    "reference_id": "2355490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52986"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exy4-ah1b-cfbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70714?format=api",
            "vulnerability_id": "VCID-f736-29kd-63g7",
            "summary": "kernel: ptdma: pt_core_execute_cmd() should use spinlock",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53013.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53013.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11478",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11407",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11269",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1127",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11397",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11339",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11295",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11231",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11537",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11322",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11404",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24482",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53013"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/13ba563c2c8055ba8a637c9f70bb833b43cb4207",
                    "reference_id": "13ba563c2c8055ba8a637c9f70bb833b43cb4207",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/13ba563c2c8055ba8a637c9f70bb833b43cb4207"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355508",
                    "reference_id": "2355508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355508"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c",
                    "reference_id": "95e5fda3b5f9ed8239b145da3fa01e641cf5d53c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ed0d8f731e0bf1bb12a7a37698ac613db20e2794",
                    "reference_id": "ed0d8f731e0bf1bb12a7a37698ac613db20e2794",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ed0d8f731e0bf1bb12a7a37698ac613db20e2794"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53013"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f736-29kd-63g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65286?format=api",
            "vulnerability_id": "VCID-fah9-g62s-s3h1",
            "summary": "kernel: crypto: qat - fix out-of-bounds read",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54325"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426061",
                    "reference_id": "2426061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426061"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3349",
                    "reference_id": "RHSA-2023:3349",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723",
                    "reference_id": "RHSA-2023:3723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54325"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fah9-g62s-s3h1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69194?format=api",
            "vulnerability_id": "VCID-faw1-1y85-47bp",
            "summary": "kernel: RDMA/rxe: Fix error unwind in rxe_create_qp()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50127.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50127.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06275",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06321",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06361",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06353",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06298",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373477",
                    "reference_id": "2373477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50127"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-faw1-1y85-47bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65254?format=api",
            "vulnerability_id": "VCID-fb7m-jaf7-tugv",
            "summary": "kernel: Linux kernel xHCI DbC: Denial of Service via memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50809"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426028",
                    "reference_id": "2426028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50809"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fb7m-jaf7-tugv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66289?format=api",
            "vulnerability_id": "VCID-fcez-uey6-aydd",
            "summary": "kernel: Linux kernel: Denial of Service via memory leak in ath12k Wi-Fi driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53767.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53767.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06301",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10572",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10539",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10368",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10481",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53767"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419934",
                    "reference_id": "2419934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419934"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53767"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcez-uey6-aydd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67994?format=api",
            "vulnerability_id": "VCID-fj8t-4kh5-7kdf",
            "summary": "kernel: regulator: core: fix use_count leakage when handling boot-on",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50250.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50250.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50250",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02476",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02491",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02392",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0248",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0252",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02507",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50250"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50250",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50250"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395437",
                    "reference_id": "2395437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50250"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fj8t-4kh5-7kdf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79923?format=api",
            "vulnerability_id": "VCID-fk99-ervq-v3fx",
            "summary": "kernel: ovl: fix use after free in struct ovl_aio_req",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05254",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05154",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06203",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06218",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06249",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06258",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06391",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06095",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0609",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06081",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06055",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176140",
                    "reference_id": "2176140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8107",
                    "reference_id": "RHSA-2024:8107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8613",
                    "reference_id": "RHSA-2024:8613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8613"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8614",
                    "reference_id": "RHSA-2024:8614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8614"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1252"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fk99-ervq-v3fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67203?format=api",
            "vulnerability_id": "VCID-fkss-ns84-qkbe",
            "summary": "kernel: xhci: Remove device endpoints from bandwidth list when freeing the device",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50470.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50470.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50470"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401565",
                    "reference_id": "2401565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401565"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50470"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fkss-ns84-qkbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66972?format=api",
            "vulnerability_id": "VCID-fnzb-ch6y-t7ev",
            "summary": "kernel: RDMA/rxe: Fix mr->map double free",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01868",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01908",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01904",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01937",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0183",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02633",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50543"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402222",
                    "reference_id": "2402222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800",
                    "reference_id": "RHSA-2025:22800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801",
                    "reference_id": "RHSA-2025:22801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22801"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0532",
                    "reference_id": "RHSA-2026:0532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0536",
                    "reference_id": "RHSA-2026:0536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0536"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50543"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnzb-ch6y-t7ev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71392?format=api",
            "vulnerability_id": "VCID-fsu4-23rp-p3ha",
            "summary": "kernel: mm/mempolicy: fix uninit-value in mpol_rebind_policy()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49567.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49567.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01419",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01424",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06908",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06858",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18595",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18616",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18553",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1875",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22656",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22697",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22627",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49567"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/018160ad314d75b1409129b2247b614a9f35894c",
                    "reference_id": "018160ad314d75b1409129b2247b614a9f35894c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/018160ad314d75b1409129b2247b614a9f35894c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/13d51565cec1aa432a6ab363edc2bbc53c6f49cb",
                    "reference_id": "13d51565cec1aa432a6ab363edc2bbc53c6f49cb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/13d51565cec1aa432a6ab363edc2bbc53c6f49cb"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347961",
                    "reference_id": "2347961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347961"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5735845906fb1d90fe597f8b503fc0a857d475e3",
                    "reference_id": "5735845906fb1d90fe597f8b503fc0a857d475e3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5735845906fb1d90fe597f8b503fc0a857d475e3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/777e563f10e91e91130fe06bee85220d508e7b9b",
                    "reference_id": "777e563f10e91e91130fe06bee85220d508e7b9b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/777e563f10e91e91130fe06bee85220d508e7b9b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8c5429a04ccd8dbcc3c753dab2f4126774ec28d4",
                    "reference_id": "8c5429a04ccd8dbcc3c753dab2f4126774ec28d4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8c5429a04ccd8dbcc3c753dab2f4126774ec28d4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a1f8765f68bc9bf5744b365bb9f5e0b6db93edfe",
                    "reference_id": "a1f8765f68bc9bf5744b365bb9f5e0b6db93edfe",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a1f8765f68bc9bf5744b365bb9f5e0b6db93edfe"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/aaa1c5d635a6fca2043513ffb5be169f9cd17d9e",
                    "reference_id": "aaa1c5d635a6fca2043513ffb5be169f9cd17d9e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/aaa1c5d635a6fca2043513ffb5be169f9cd17d9e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ddb3f0b68863bd1c5f43177eea476bce316d4993",
                    "reference_id": "ddb3f0b68863bd1c5f43177eea476bce316d4993",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ddb3f0b68863bd1c5f43177eea476bce316d4993"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49567"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsu4-23rp-p3ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67097?format=api",
            "vulnerability_id": "VCID-funv-d48z-63bz",
            "summary": "kernel: net/mlx5e: Fix deadlock in tc route query code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01657",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01666",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01673",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01661",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01651",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0165",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01741",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01735",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0177",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01638",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01731",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02526",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02542",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53591"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401459",
                    "reference_id": "2401459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53591"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-funv-d48z-63bz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67201?format=api",
            "vulnerability_id": "VCID-g6cn-1z44-2bb3",
            "summary": "kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50494.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50494.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401563",
                    "reference_id": "2401563",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401563"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50494"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g6cn-1z44-2bb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67187?format=api",
            "vulnerability_id": "VCID-gg3w-g76t-vkcm",
            "summary": "kernel: drm/mipi-dsi: Detach devices when removing the host",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50489"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401549",
                    "reference_id": "2401549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50489"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg3w-g76t-vkcm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65470?format=api",
            "vulnerability_id": "VCID-gjzs-dmbv-9yfa",
            "summary": "kernel: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54259.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54259.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54259"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426250",
                    "reference_id": "2426250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54259"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gjzs-dmbv-9yfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69828?format=api",
            "vulnerability_id": "VCID-gk45-q85r-wkgv",
            "summary": "kernel: veth: Fix use after free in XDP_REDIRECT",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53107.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53107.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16114",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16132",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1617",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15899",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16012",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53107"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363720",
                    "reference_id": "2363720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8133",
                    "reference_id": "RHSA-2025:8133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8134",
                    "reference_id": "RHSA-2025:8134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8399",
                    "reference_id": "RHSA-2025:8399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8399"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53107"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gk45-q85r-wkgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67514?format=api",
            "vulnerability_id": "VCID-gm7v-6v2w-wygh",
            "summary": "kernel: drm/amdgpu: SDMA update use unlocked iterator",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50393.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50393.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50393"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396403",
                    "reference_id": "2396403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396403"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3913f0179ba366f7d7d160c506ce00de1602bbc4",
                    "reference_id": "3913f0179ba366f7d7d160c506ce00de1602bbc4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3913f0179ba366f7d7d160c506ce00de1602bbc4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4ff3d517cebe8a29b9f3c302b5292bb1ce291e00",
                    "reference_id": "4ff3d517cebe8a29b9f3c302b5292bb1ce291e00",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4ff3d517cebe8a29b9f3c302b5292bb1ce291e00"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b892c57a3a04c8de247ab9ee08a0a8cf53290e19",
                    "reference_id": "b892c57a3a04c8de247ab9ee08a0a8cf53290e19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b892c57a3a04c8de247ab9ee08a0a8cf53290e19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50393"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7v-6v2w-wygh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67988?format=api",
            "vulnerability_id": "VCID-gnbs-xcjx-nqf2",
            "summary": "kernel: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50258.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50258.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02625",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02645",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02495",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02485",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02483",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02473",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0258",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02568",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02557",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02618",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02587",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02605",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50258"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395431",
                    "reference_id": "2395431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50258"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gnbs-xcjx-nqf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79042?format=api",
            "vulnerability_id": "VCID-gpdn-rup2-7fey",
            "summary": "kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1289",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1298",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.128",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12803",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13192",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13095",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13513",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13249",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13315",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13322",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13295",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40133"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133453",
                    "reference_id": "2133453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133453"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930",
                    "reference_id": "RHSA-2024:0930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0930"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823",
                    "reference_id": "RHSA-2024:4823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831",
                    "reference_id": "RHSA-2024:4831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4831"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-40133"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69996?format=api",
            "vulnerability_id": "VCID-gqea-6hjd-jyas",
            "summary": "kernel: net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49855.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49855.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49855"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/13b1ea861e8aeb701bcfbfe436b943efa2d44029",
                    "reference_id": "13b1ea861e8aeb701bcfbfe436b943efa2d44029",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:06:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/13b1ea861e8aeb701bcfbfe436b943efa2d44029"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363369",
                    "reference_id": "2363369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363369"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7560ceef4d2832a67e8781d924e129c7f542376f",
                    "reference_id": "7560ceef4d2832a67e8781d924e129c7f542376f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:06:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7560ceef4d2832a67e8781d924e129c7f542376f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d38a648d2d6cc7bee11c6f533ff9426a00c2a74c",
                    "reference_id": "d38a648d2d6cc7bee11c6f533ff9426a00c2a74c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:06:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d38a648d2d6cc7bee11c6f533ff9426a00c2a74c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49855"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqea-6hjd-jyas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71611?format=api",
            "vulnerability_id": "VCID-gqwc-7qfc-jyh5",
            "summary": "kernel: watch_queue: Fix NULL dereference in error cleanup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49257.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49257.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06794",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06646",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06641",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06666",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06507",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06549",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06543",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06536",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06462",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06471",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0662",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06631",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10417",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49257"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348185",
                    "reference_id": "2348185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49257"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqwc-7qfc-jyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65690?format=api",
            "vulnerability_id": "VCID-grc1-cyvv-qbha",
            "summary": "kernel: iommufd: Do not add the same hwpt to the ioas->hwpt_list twice",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54043.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54043.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54043"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425077",
                    "reference_id": "2425077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54043"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grc1-cyvv-qbha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65544?format=api",
            "vulnerability_id": "VCID-guaw-96sn-s3cw",
            "summary": "kernel: Kernel (iommufd): Information Disclosure via uninitialized memory padding",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54034.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54034.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54034"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424929",
                    "reference_id": "2424929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424929"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54034"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-guaw-96sn-s3cw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65385?format=api",
            "vulnerability_id": "VCID-gwxs-axhu-57ew",
            "summary": "kernel: Linux kernel: Denial of Service due to xfrm resource leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426162",
                    "reference_id": "2426162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426162"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54273"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwxs-axhu-57ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65388?format=api",
            "vulnerability_id": "VCID-gxc8-y1x5-1qgk",
            "summary": "kernel: cifs: Fix xid leak in cifs_ses_add_channel()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426165",
                    "reference_id": "2426165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447",
                    "reference_id": "RHSA-2025:19447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19447"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50856"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxc8-y1x5-1qgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65349?format=api",
            "vulnerability_id": "VCID-h15v-get3-bqaw",
            "summary": "kernel: Linux kernel: Denial of Service in mlx5 driver due to memory leaks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54238"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426125",
                    "reference_id": "2426125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426125"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54238"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h15v-get3-bqaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66151?format=api",
            "vulnerability_id": "VCID-h669-ukx5-9qag",
            "summary": "kernel: ipmi: fix use after free in _ipmi_destroy_user()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50677"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420325",
                    "reference_id": "2420325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517",
                    "reference_id": "RHSA-2023:4517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50677"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h669-ukx5-9qag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67162?format=api",
            "vulnerability_id": "VCID-h9yg-t4f4-xkde",
            "summary": "kernel: null_blk: Always check queue mode setting from configfs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03026",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53576"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401524",
                    "reference_id": "2401524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53576"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9yg-t4f4-xkde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69195?format=api",
            "vulnerability_id": "VCID-ha2d-qmbd-9bdm",
            "summary": "kernel: nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50005.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50005.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06814",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06919",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06937",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20493",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20675",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20563",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2056",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20529",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20422",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50005"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50005"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373478",
                    "reference_id": "2373478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50005"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ha2d-qmbd-9bdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67623?format=api",
            "vulnerability_id": "VCID-hbbe-n2ng-byg9",
            "summary": "kernel: drm/amdkfd: Fix kfd_process_device_init_vm error handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50354.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50354.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50354",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50354"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396109",
                    "reference_id": "2396109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396109"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/29d48b87db64b6697ddad007548e51d032081c59",
                    "reference_id": "29d48b87db64b6697ddad007548e51d032081c59",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/29d48b87db64b6697ddad007548e51d032081c59"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9",
                    "reference_id": "9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b6e78bd3bf2eb964c95eb2596d3cd367307a20b5",
                    "reference_id": "b6e78bd3bf2eb964c95eb2596d3cd367307a20b5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b6e78bd3bf2eb964c95eb2596d3cd367307a20b5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50354"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hbbe-n2ng-byg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66244?format=api",
            "vulnerability_id": "VCID-he5z-sfrw-47ge",
            "summary": "kernel: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50619"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419867",
                    "reference_id": "2419867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419867"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50619"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-he5z-sfrw-47ge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67010?format=api",
            "vulnerability_id": "VCID-hg7n-8c5b-zfe4",
            "summary": "kernel: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53671"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402261",
                    "reference_id": "2402261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53671"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hg7n-8c5b-zfe4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67770?format=api",
            "vulnerability_id": "VCID-hj5u-vk4h-mkgt",
            "summary": "kernel: Kernel: Denial of Service in CIFS due to xid leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50351.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50351.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50351",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50351"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395872",
                    "reference_id": "2395872",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395872"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/593d877c39aa9f3fe1a4b5b022492886d7d700ec",
                    "reference_id": "593d877c39aa9f3fe1a4b5b022492886d7d700ec",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/593d877c39aa9f3fe1a4b5b022492886d7d700ec"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/92aa09c86ef297976a3c27c6574c0839418dc2c4",
                    "reference_id": "92aa09c86ef297976a3c27c6574c0839418dc2c4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/92aa09c86ef297976a3c27c6574c0839418dc2c4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fee0fb1f15054bb6a0ede452acb42da5bef4d587",
                    "reference_id": "fee0fb1f15054bb6a0ede452acb42da5bef4d587",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fee0fb1f15054bb6a0ede452acb42da5bef4d587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50351"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj5u-vk4h-mkgt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65607?format=api",
            "vulnerability_id": "VCID-hkx9-46zj-e3fb",
            "summary": "kernel: Linux kernel: Denial of Service due to incorrect FDIR filter fallback logic",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54040.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54040.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54040"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424992",
                    "reference_id": "2424992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424992"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54040"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hkx9-46zj-e3fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67902?format=api",
            "vulnerability_id": "VCID-hnxx-dpf5-m3gu",
            "summary": "kernel: Linux kernel: Denial of Service via deadlock in net/smc",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53233.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53233.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0146",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02184",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02135",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02132",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02107",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02119",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02206",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02174",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0216",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02161",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53233"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/13085e1b5cab8ad802904d72e6a6dae85ae0cd20",
                    "reference_id": "13085e1b5cab8ad802904d72e6a6dae85ae0cd20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/13085e1b5cab8ad802904d72e6a6dae85ae0cd20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395339",
                    "reference_id": "2395339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395339"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3517584cf1b35bd02f4a90267ddf9dcf17bd9c87",
                    "reference_id": "3517584cf1b35bd02f4a90267ddf9dcf17bd9c87",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3517584cf1b35bd02f4a90267ddf9dcf17bd9c87"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9708efad9ba5095b9bb7916e11a135b3bd66c071",
                    "reference_id": "9708efad9ba5095b9bb7916e11a135b3bd66c071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9708efad9ba5095b9bb7916e11a135b3bd66c071"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b615238e5bc01e13dc0610febddc1ca99bab1df6",
                    "reference_id": "b615238e5bc01e13dc0610febddc1ca99bab1df6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b615238e5bc01e13dc0610febddc1ca99bab1df6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c9ca2257150272df1b8d9ebe5059197ffea6e913",
                    "reference_id": "c9ca2257150272df1b8d9ebe5059197ffea6e913",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c9ca2257150272df1b8d9ebe5059197ffea6e913"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53233"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnxx-dpf5-m3gu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67696?format=api",
            "vulnerability_id": "VCID-hq32-ndng-kqcw",
            "summary": "kernel: sctp: check send stream number after wait_for_sndbuf",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53296.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53296.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53296",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53296"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53296",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53296"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0443fff49d6352160c200064156c25898bd9f58c",
                    "reference_id": "0443fff49d6352160c200064156c25898bd9f58c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0443fff49d6352160c200064156c25898bd9f58c"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395682",
                    "reference_id": "2395682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395682"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2584024b23552c00d95b50255e47bd18d306d31a",
                    "reference_id": "2584024b23552c00d95b50255e47bd18d306d31a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2584024b23552c00d95b50255e47bd18d306d31a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f",
                    "reference_id": "667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9346a1a21142357972a6f466ba6275ddc54b04ac",
                    "reference_id": "9346a1a21142357972a6f466ba6275ddc54b04ac",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9346a1a21142357972a6f466ba6275ddc54b04ac"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a615e7270318fa0b98bf1ff38daf6cf52d840312",
                    "reference_id": "a615e7270318fa0b98bf1ff38daf6cf52d840312",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a615e7270318fa0b98bf1ff38daf6cf52d840312"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce",
                    "reference_id": "b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d2128636b303aa9cf065055402ee6697409a8837",
                    "reference_id": "d2128636b303aa9cf065055402ee6697409a8837",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d2128636b303aa9cf065055402ee6697409a8837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53296"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hq32-ndng-kqcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78605?format=api",
            "vulnerability_id": "VCID-hvkn-sk3f-pud6",
            "summary": "kernel: Use after free bug in btsdio_remove due to race condition",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04404",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04252",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04367",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04242",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04232",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04385",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04485",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0446",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04498",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04549",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0511",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05652",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05592",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05597",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1989"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945",
                    "reference_id": "2185945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185945"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5492",
                    "reference_id": "dsa-5492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5492"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
                    "reference_id": "?id=f132c2d13088",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230601-0004/",
                    "reference_id": "ntap-20230601-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230601-0004/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740",
                    "reference_id": "RHSA-2024:4740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4740"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6175-1/",
                    "reference_id": "USN-6175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6186-1/",
                    "reference_id": "USN-6186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6186-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1989"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvkn-sk3f-pud6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66076?format=api",
            "vulnerability_id": "VCID-hwkx-sg81-sfey",
            "summary": "kernel: iommufd: IOMMUFD_DESTROY should not increase the refcount",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53795.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53795.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06521",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10572",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10539",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10368",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10481",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53795"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420238",
                    "reference_id": "2420238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53795"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwkx-sg81-sfey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78688?format=api",
            "vulnerability_id": "VCID-j2sn-sycw-7bfc",
            "summary": "kernel: tap: tap_open(): correctly initialize socket uid",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0102",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0095",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0101",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01012",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01015",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01019",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01022",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00957",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1076"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173435",
                    "reference_id": "2173435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173435"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff",
                    "reference_id": "?id=66b2c338adce580dfce2199591e65e2bab889cff",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:04:00Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a",
                    "reference_id": "?id=a096ccca6e503a5c575717ff8a36ace27510ab0a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:04:00Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:04:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6171-1/",
                    "reference_id": "USN-6171-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6171-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6172-1/",
                    "reference_id": "USN-6172-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6172-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6185-1/",
                    "reference_id": "USN-6185-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6185-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6187-1/",
                    "reference_id": "USN-6187-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6187-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6207-1/",
                    "reference_id": "USN-6207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6223-1/",
                    "reference_id": "USN-6223-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6223-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1076"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2sn-sycw-7bfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78356?format=api",
            "vulnerability_id": "VCID-j7z5-3htn-vkd2",
            "summary": "kernel: hash collisions in the IPv6 connection lookup table",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11447",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11435",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11294",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11408",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11236",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11238",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11366",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11307",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12053",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12133",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12242",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12191",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175903",
                    "reference_id": "2175903",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175903"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5480",
                    "reference_id": "dsa-5480",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5480"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5492",
                    "reference_id": "dsa-5492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5492"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0006/",
                    "reference_id": "ntap-20230929-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230929-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603",
                    "reference_id": "RHSA-2023:5603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5603"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604",
                    "reference_id": "RHSA-2023:5604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627",
                    "reference_id": "RHSA-2023:5627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5627"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6343-1/",
                    "reference_id": "USN-6343-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6343-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-1/",
                    "reference_id": "USN-6416-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-2/",
                    "reference_id": "USN-6416-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-3/",
                    "reference_id": "USN-6416-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6417-1/",
                    "reference_id": "USN-6417-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6417-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6439-1/",
                    "reference_id": "USN-6439-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6439-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6439-2/",
                    "reference_id": "USN-6439-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6439-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-1/",
                    "reference_id": "USN-6440-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-2/",
                    "reference_id": "USN-6440-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-3/",
                    "reference_id": "USN-6440-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-1/",
                    "reference_id": "USN-6445-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-2/",
                    "reference_id": "USN-6445-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6460-1/",
                    "reference_id": "USN-6460-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6460-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1206"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78892?format=api",
            "vulnerability_id": "VCID-j8ze-t6w6-ekak",
            "summary": "kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21243",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21444",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21296",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21294",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21274",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21176",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22918",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22962",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22755",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22882",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22902",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22809",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22822",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22816",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42895"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147356",
                    "reference_id": "2147356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147356"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2834",
                    "reference_id": "AVG-2834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2835",
                    "reference_id": "AVG-2835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2835"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2836",
                    "reference_id": "AVG-2836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2836"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2837",
                    "reference_id": "AVG-2837",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2837"
                },
                {
                    "reference_url": "https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
                    "reference_id": "#b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"
                        }
                    ],
                    "url": "https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
                    "reference_id": "b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1877",
                    "reference_id": "RHSA-2024:1877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2621",
                    "reference_id": "RHSA-2024:2621",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2621"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5780-1/",
                    "reference_id": "USN-5780-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5780-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5850-1/",
                    "reference_id": "USN-5850-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5850-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5851-1/",
                    "reference_id": "USN-5851-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5851-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5853-1/",
                    "reference_id": "USN-5853-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5853-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5858-1/",
                    "reference_id": "USN-5858-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5858-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5859-1/",
                    "reference_id": "USN-5859-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5859-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5860-1/",
                    "reference_id": "USN-5860-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5860-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5874-1/",
                    "reference_id": "USN-5874-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5874-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5875-1/",
                    "reference_id": "USN-5875-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5875-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5876-1/",
                    "reference_id": "USN-5876-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5876-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5877-1/",
                    "reference_id": "USN-5877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5878-1/",
                    "reference_id": "USN-5878-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5878-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5879-1/",
                    "reference_id": "USN-5879-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5879-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5884-1/",
                    "reference_id": "USN-5884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5909-1/",
                    "reference_id": "USN-5909-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5909-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5918-1/",
                    "reference_id": "USN-5918-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5918-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5919-1/",
                    "reference_id": "USN-5919-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5919-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5920-1/",
                    "reference_id": "USN-5920-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5920-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5925-1/",
                    "reference_id": "USN-5925-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5925-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5926-1/",
                    "reference_id": "USN-5926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5927-1/",
                    "reference_id": "USN-5927-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5927-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42895"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67138?format=api",
            "vulnerability_id": "VCID-jkj8-rva5-tfd1",
            "summary": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53598"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500",
                    "reference_id": "2401500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4356",
                    "reference_id": "RHSA-2021:4356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53598"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jkj8-rva5-tfd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65424?format=api",
            "vulnerability_id": "VCID-jm6q-xquz-77aw",
            "summary": "kernel: scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54234.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54234.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54234"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426202",
                    "reference_id": "2426202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54234"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm6q-xquz-77aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66773?format=api",
            "vulnerability_id": "VCID-jm8t-qsys-7bav",
            "summary": "kernel: drm: Fix potential null-ptr-deref due to drmm_mode_config_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50556.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50556.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08409",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08461",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08382",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08471",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08306",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08433",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08364",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08317",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08459",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50556"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50556"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405727",
                    "reference_id": "2405727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405727"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50556"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm8t-qsys-7bav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67603?format=api",
            "vulnerability_id": "VCID-jn9n-s2nn-8kft",
            "summary": "kernel: mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53443.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53443.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02476",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02491",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02489",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0248",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0252",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02507",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53443"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53443"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396531",
                    "reference_id": "2396531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396531"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53443"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9n-s2nn-8kft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69808?format=api",
            "vulnerability_id": "VCID-jpsy-mz9f-bkey",
            "summary": "kernel: i40e: Fix kernel crash during reboot when adapter is in recovery mode",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53114.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53114.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53114"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53114"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363698",
                    "reference_id": "2363698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363698"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53114"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jpsy-mz9f-bkey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75889?format=api",
            "vulnerability_id": "VCID-jstt-fu27-kyht",
            "summary": "kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52707.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52707.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05771",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0614",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05802",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05949",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05981",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06025",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06044",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05846",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05829",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05794",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282615",
                    "reference_id": "2282615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282615"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7caeb5457bd01ccba0df1d6f4872f20d28e50b38",
                    "reference_id": "7caeb5457bd01ccba0df1d6f4872f20d28e50b38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:37:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7caeb5457bd01ccba0df1d6f4872f20d28e50b38"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe",
                    "reference_id": "c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:37:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a",
                    "reference_id": "c6879a4dcefe92d870ab68cabaa9caeda4f2af5a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:37:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
                    "reference_id": "cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:37:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ec9c7aa08819f976b2492fa63c41b5712d2924b5",
                    "reference_id": "ec9c7aa08819f976b2492fa63c41b5712d2924b5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:37:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ec9c7aa08819f976b2492fa63c41b5712d2924b5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823",
                    "reference_id": "RHSA-2024:4823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831",
                    "reference_id": "RHSA-2024:4831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4831"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101",
                    "reference_id": "RHSA-2024:5101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102",
                    "reference_id": "RHSA-2024:5102",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5102"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52707"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jstt-fu27-kyht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78665?format=api",
            "vulnerability_id": "VCID-jt33-xayh-5ke1",
            "summary": "kernel: vmwgfx: double free within the handling of vmw_buffer_object objects",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33952",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00982",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00941",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00935",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00985",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00987",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00991",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00984",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00946",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0095",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00934",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00929",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00927",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33952"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218212",
                    "reference_id": "2218212",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218212"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-33952",
                    "reference_id": "CVE-2023-33952",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-33952"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823",
                    "reference_id": "RHSA-2024:4823",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831",
                    "reference_id": "RHSA-2024:4831",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4831"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292",
                    "reference_id": "ZDI-CAN-20292",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-33952"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jt33-xayh-5ke1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71129?format=api",
            "vulnerability_id": "VCID-ju8a-te2v-57ht",
            "summary": "kernel: af_unix: Fix a data-race in unix_dgram_peer_wake_me().",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49344.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49344.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.008",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00796",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00791",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00785",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00786",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00787",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0079",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00833",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00836",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00834",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49344"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49344"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347694",
                    "reference_id": "2347694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347694"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/556720013c36c193d9cbfb06e7b33e51f0c39fbf",
                    "reference_id": "556720013c36c193d9cbfb06e7b33e51f0c39fbf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/556720013c36c193d9cbfb06e7b33e51f0c39fbf"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/662a80946ce13633ae90a55379f1346c10f0c432",
                    "reference_id": "662a80946ce13633ae90a55379f1346c10f0c432",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/662a80946ce13633ae90a55379f1346c10f0c432"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/71e8bfc7f838cabc60cba24e09ca84c4f8321ab2",
                    "reference_id": "71e8bfc7f838cabc60cba24e09ca84c4f8321ab2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/71e8bfc7f838cabc60cba24e09ca84c4f8321ab2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8801eb3ccd2e4e3b1a01449383e3321ae6dbd9d6",
                    "reference_id": "8801eb3ccd2e4e3b1a01449383e3321ae6dbd9d6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8801eb3ccd2e4e3b1a01449383e3321ae6dbd9d6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/95f0ba806277733bf6024e23e27e1be773701cca",
                    "reference_id": "95f0ba806277733bf6024e23e27e1be773701cca",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/95f0ba806277733bf6024e23e27e1be773701cca"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c61848500a3fd6867dfa4834b8c7f97133eceb9f",
                    "reference_id": "c61848500a3fd6867dfa4834b8c7f97133eceb9f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c61848500a3fd6867dfa4834b8c7f97133eceb9f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c926ae58f24f7bd55aa2ea4add9f952032507913",
                    "reference_id": "c926ae58f24f7bd55aa2ea4add9f952032507913",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c926ae58f24f7bd55aa2ea4add9f952032507913"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49344"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ju8a-te2v-57ht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78716?format=api",
            "vulnerability_id": "VCID-jure-kwde-eufu",
            "summary": "kernel: fbcon: shift-out-of-bounds in fbcon_set_font()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02315",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02324",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02302",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02294",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02338",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02311",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02249",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0227",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02253",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02242",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02221",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02231",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3161"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213485",
                    "reference_id": "2213485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213485"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be",
                    "reference_id": "2b09d5d364986f724f17001ccfe4126b9b43a0be",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"
                        }
                    ],
                    "url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603",
                    "reference_id": "RHSA-2023:5603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5603"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604",
                    "reference_id": "RHSA-2023:5604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6254-1/",
                    "reference_id": "USN-6254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6254-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3161"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jure-kwde-eufu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67571?format=api",
            "vulnerability_id": "VCID-jvuw-pxdt-afb9",
            "summary": "kernel: wifi: mt76: dma: fix memory leak running mt76_dma_tx_cleanup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53430.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53430.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0477",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05469",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05427",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53430"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396497",
                    "reference_id": "2396497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396497"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3f7dda36e0b6dfa2cd26191f754ba061ab8191f2",
                    "reference_id": "3f7dda36e0b6dfa2cd26191f754ba061ab8191f2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:14:49Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3f7dda36e0b6dfa2cd26191f754ba061ab8191f2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/604990fee0a6d608a6cca179ae474f2a1c6add8a",
                    "reference_id": "604990fee0a6d608a6cca179ae474f2a1c6add8a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:14:49Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/604990fee0a6d608a6cca179ae474f2a1c6add8a"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53430"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuw-pxdt-afb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67191?format=api",
            "vulnerability_id": "VCID-jwe4-fgr4-zycp",
            "summary": "kernel: drm: amd: display: Fix memory leakage",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53605.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53605.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03026",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53605"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53605"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401553",
                    "reference_id": "2401553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53605"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwe4-fgr4-zycp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67007?format=api",
            "vulnerability_id": "VCID-jyc7-e3p5-uyh5",
            "summary": "kernel: ASoC: lpass: Fix for KASAN use_after_free out of bounds",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03487",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03411",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03522",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03527",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03571",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03399",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03516",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04744",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04782",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402258",
                    "reference_id": "2402258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402258"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53640"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyc7-e3p5-uyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65732?format=api",
            "vulnerability_id": "VCID-k4wg-5xv6-2ufy",
            "summary": "kernel: Linux kernel rt2x00 Wi-Fi driver: Denial of Service via memory leak during device removal",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54131.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54131.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54131"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425120",
                    "reference_id": "2425120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425120"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54131"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4wg-5xv6-2ufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65439?format=api",
            "vulnerability_id": "VCID-kawh-gu6n-p3df",
            "summary": "kernel: rxrpc: Fix timeout of a call that hasn't yet been granted a channel",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54195.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54195.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54195"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426218",
                    "reference_id": "2426218",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426218"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54195"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kawh-gu6n-p3df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65244?format=api",
            "vulnerability_id": "VCID-kc7z-fg9w-8uhr",
            "summary": "kernel: dm flakey: don't corrupt the zero page",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54317.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54317.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426017",
                    "reference_id": "2426017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54317"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kc7z-fg9w-8uhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66965?format=api",
            "vulnerability_id": "VCID-kd1y-s2dm-yqfh",
            "summary": "kernel: wifi: mt7601u: fix an integer underflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402215",
                    "reference_id": "2402215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402215"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53679"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kd1y-s2dm-yqfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65785?format=api",
            "vulnerability_id": "VCID-kejc-7s3x-huah",
            "summary": "kernel: KVM: s390: pv: fix index value of replaced ASCE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54092.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54092.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54092"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425173",
                    "reference_id": "2425173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425173"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54092"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kejc-7s3x-huah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65398?format=api",
            "vulnerability_id": "VCID-keyw-9548-ebez",
            "summary": "kernel: perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50820.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50820.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50820",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50820"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426176",
                    "reference_id": "2426176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426176"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50820"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-keyw-9548-ebez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77151?format=api",
            "vulnerability_id": "VCID-kg1f-schr-8fh4",
            "summary": "kernel: null pointer when load rlc firmware",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26649.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26649.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26649",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03302",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0329",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03288",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03328",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03279",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0324",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03257",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03263",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03284",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03215",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03194",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03167",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03298",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26649"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796",
                    "reference_id": "2271796",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
                    "reference_id": "8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:54:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
                    "reference_id": "bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:54:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
                    "reference_id": "d3887448486caeef9687fb5dfebd4ff91e0f25aa",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:54:05Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000",
                    "reference_id": "RHSA-2024:7000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7000"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7001",
                    "reference_id": "RHSA-2024:7001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7001"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6818-1/",
                    "reference_id": "USN-6818-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6818-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6818-2/",
                    "reference_id": "USN-6818-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6818-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6818-3/",
                    "reference_id": "USN-6818-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6818-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6818-4/",
                    "reference_id": "USN-6818-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6818-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6819-1/",
                    "reference_id": "USN-6819-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6819-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6819-2/",
                    "reference_id": "USN-6819-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6819-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6819-3/",
                    "reference_id": "USN-6819-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6819-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6819-4/",
                    "reference_id": "USN-6819-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6819-4/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2024-26649"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg1f-schr-8fh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66136?format=api",
            "vulnerability_id": "VCID-khqx-5cyy-p3fv",
            "summary": "kernel: md/raid10: fix null-ptr-deref in raid10_sync_request",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53832.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53832.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08811",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53832"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420309",
                    "reference_id": "2420309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53832"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khqx-5cyy-p3fv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67692?format=api",
            "vulnerability_id": "VCID-khyt-2dss-uyb7",
            "summary": "kernel: md/raid10: fix leak of 'r10bio->remaining' for recovery",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53299.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53299.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03717",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395677",
                    "reference_id": "2395677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53299"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khyt-2dss-uyb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70688?format=api",
            "vulnerability_id": "VCID-kq9n-me5e-kked",
            "summary": "kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49750.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49750.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01156",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06912",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06896",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07032",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07017",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07019",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06983",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06898",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06954",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06985",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06979",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06974",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09242",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49750"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355480",
                    "reference_id": "2355480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355480"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045",
                    "reference_id": "7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:07Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f5f94b9c8b805d87ff185caf9779c3a4d07819e3",
                    "reference_id": "f5f94b9c8b805d87ff185caf9779c3a4d07819e3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:23:07Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f5f94b9c8b805d87ff185caf9779c3a4d07819e3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49750"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kq9n-me5e-kked"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65251?format=api",
            "vulnerability_id": "VCID-krmg-gap1-hbe6",
            "summary": "kernel: Linux kernel: Memory leak in wilc1000 Wi-Fi driver causes Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50832.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50832.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50832"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50832"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426025",
                    "reference_id": "2426025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50832"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krmg-gap1-hbe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65417?format=api",
            "vulnerability_id": "VCID-ksyu-mqmf-b3g1",
            "summary": "kernel: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54320.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54320.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54320"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426195",
                    "reference_id": "2426195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54320"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksyu-mqmf-b3g1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65669?format=api",
            "vulnerability_id": "VCID-ktdj-jevg-4ken",
            "summary": "kernel: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54073"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425056",
                    "reference_id": "2425056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54073"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktdj-jevg-4ken"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67188?format=api",
            "vulnerability_id": "VCID-ktvv-15kj-3fg7",
            "summary": "kernel: netfilter: nft_set_rbtree: fix null deref on element insertion",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53566.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53566.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53566"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401550",
                    "reference_id": "2401550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401550"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3421",
                    "reference_id": "RHSA-2024:3421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3421"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53566"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktvv-15kj-3fg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66094?format=api",
            "vulnerability_id": "VCID-kvcb-zw88-kucc",
            "summary": "kernel: usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06386",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10305",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10119",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10098",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10211",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50633"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420258",
                    "reference_id": "2420258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420258"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50633"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvcb-zw88-kucc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67844?format=api",
            "vulnerability_id": "VCID-kyym-wgpn-xyhn",
            "summary": "kernel: drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50287.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50287.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50287"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395279",
                    "reference_id": "2395279",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395279"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50287"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kyym-wgpn-xyhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78259?format=api",
            "vulnerability_id": "VCID-kz9r-zumw-5ydf",
            "summary": "kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02121",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02133",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02127",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02112",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02108",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02084",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02185",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02153",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02144",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02168",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02125",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02131",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02137",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc",
                    "reference_id": "04c55383fa5689357bcdd2c8036725a55ed632bc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225201",
                    "reference_id": "2225201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225201"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
                    "reference_id": "commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5480",
                    "reference_id": "dsa-5480",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5480"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
                    "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
                    "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230818-0005/",
                    "reference_id": "ntap-20230818-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230818-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5574",
                    "reference_id": "RHSA-2023:5574",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5574"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5621",
                    "reference_id": "RHSA-2023:5621",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5621"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5622",
                    "reference_id": "RHSA-2023:5622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5628",
                    "reference_id": "RHSA-2023:5628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5628"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5775",
                    "reference_id": "RHSA-2023:5775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5775"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5794",
                    "reference_id": "RHSA-2023:5794",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5794"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6799",
                    "reference_id": "RHSA-2023:6799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6813",
                    "reference_id": "RHSA-2023:6813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7294",
                    "reference_id": "RHSA-2023:7294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7398",
                    "reference_id": "RHSA-2023:7398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7398"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7410",
                    "reference_id": "RHSA-2023:7410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7410"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7417",
                    "reference_id": "RHSA-2023:7417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7417"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418",
                    "reference_id": "RHSA-2023:7418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7431",
                    "reference_id": "RHSA-2023:7431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7434",
                    "reference_id": "RHSA-2023:7434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7434"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7558",
                    "reference_id": "RHSA-2023:7558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0999",
                    "reference_id": "RHSA-2024:0999",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250",
                    "reference_id": "RHSA-2024:1250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1253",
                    "reference_id": "RHSA-2024:1253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306",
                    "reference_id": "RHSA-2024:1306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1306"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6285-1/",
                    "reference_id": "USN-6285-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6285-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6315-1/",
                    "reference_id": "USN-6315-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6315-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6317-1/",
                    "reference_id": "USN-6317-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6317-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6318-1/",
                    "reference_id": "USN-6318-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6318-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6321-1/",
                    "reference_id": "USN-6321-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6321-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6324-1/",
                    "reference_id": "USN-6324-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6324-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6325-1/",
                    "reference_id": "USN-6325-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6325-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6328-1/",
                    "reference_id": "USN-6328-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6328-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6329-1/",
                    "reference_id": "USN-6329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6330-1/",
                    "reference_id": "USN-6330-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6330-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6346-1/",
                    "reference_id": "USN-6346-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6346-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6348-1/",
                    "reference_id": "USN-6348-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6348-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6357-1/",
                    "reference_id": "USN-6357-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6357-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6397-1/",
                    "reference_id": "USN-6397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3609"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kz9r-zumw-5ydf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65347?format=api",
            "vulnerability_id": "VCID-m2wm-3hmb-xbd7",
            "summary": "kernel: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15215",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50829"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50829"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426123",
                    "reference_id": "2426123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50829"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2wm-3hmb-xbd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67189?format=api",
            "vulnerability_id": "VCID-m3b3-sg1w-huh4",
            "summary": "kernel: block, bfq: fix possible uaf for 'bfqq->bic'",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50488.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50488.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03017",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03119",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03153",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02993",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03001",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03122",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04332",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50488"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401551",
                    "reference_id": "2401551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50488"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3b3-sg1w-huh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67297?format=api",
            "vulnerability_id": "VCID-m7vs-ucbg-uua9",
            "summary": "kernel: memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50429.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50429.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50429"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50429"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400731",
                    "reference_id": "2400731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400731"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50429"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7vs-ucbg-uua9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65703?format=api",
            "vulnerability_id": "VCID-m8bu-d32s-juht",
            "summary": "kernel: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50781.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50781.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425091",
                    "reference_id": "2425091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50781"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m8bu-d32s-juht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67845?format=api",
            "vulnerability_id": "VCID-mcge-tug2-y7a1",
            "summary": "kernel: Linux kernel: Denial of Service in vfio/type1 due to locked_vm underflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53171.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53171.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0411",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04128",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04005",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0396",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03972",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53171"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53171"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395280",
                    "reference_id": "2395280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53171"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcge-tug2-y7a1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79429?format=api",
            "vulnerability_id": "VCID-mdea-2xac-53ck",
            "summary": "kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05109",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05158",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05133",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05117",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05102",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05049",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05202",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06317",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06149",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0618",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06187",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06208",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1838"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1838"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087568",
                    "reference_id": "2087568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087568"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881",
                    "reference_id": "RHSA-2024:0881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0881"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897",
                    "reference_id": "RHSA-2024:0897",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0897"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6740-1/",
                    "reference_id": "USN-6740-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6740-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1838"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdea-2xac-53ck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69844?format=api",
            "vulnerability_id": "VCID-mfad-yumu-hyce",
            "summary": "kernel: ext4: fix task hung in ext4_xattr_delete_inode",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53089.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53089.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12256",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12302",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12241",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12037",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1204",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1213",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12097",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11996",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11909",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12044",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363736",
                    "reference_id": "2363736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53089"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfad-yumu-hyce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65258?format=api",
            "vulnerability_id": "VCID-mfx1-j7a5-aye4",
            "summary": "kernel: ipv6: Fix an uninit variable access bug in __ip6_make_skb()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54265.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54265.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54265",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54265"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426032",
                    "reference_id": "2426032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426032"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54265"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfx1-j7a5-aye4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66225?format=api",
            "vulnerability_id": "VCID-mgq1-styv-duak",
            "summary": "kernel: s390/vfio-ap: fix memory leak in vfio_ap device driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53746.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53746.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08421",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14628",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419839",
                    "reference_id": "2419839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419839"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53746"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mgq1-styv-duak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67807?format=api",
            "vulnerability_id": "VCID-mj87-myus-3kcr",
            "summary": "kernel: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53229.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53229.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53229"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/022c8320d9eb7394538bd716fa1a07a5ed92621b",
                    "reference_id": "022c8320d9eb7394538bd716fa1a07a5ed92621b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/022c8320d9eb7394538bd716fa1a07a5ed92621b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/12b220a6171faf10638ab683a975cadcf1a352d6",
                    "reference_id": "12b220a6171faf10638ab683a975cadcf1a352d6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/12b220a6171faf10638ab683a975cadcf1a352d6"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395236",
                    "reference_id": "2395236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395236"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/30c5a016a37a668c1c07442cf94de6e99ea7417a",
                    "reference_id": "30c5a016a37a668c1c07442cf94de6e99ea7417a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/30c5a016a37a668c1c07442cf94de6e99ea7417a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3fe20515449a80a177526d2ecd13b43f6ee41aeb",
                    "reference_id": "3fe20515449a80a177526d2ecd13b43f6ee41aeb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3fe20515449a80a177526d2ecd13b43f6ee41aeb"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/73752a39e2a6e38eee3ba90ece2ded598ea88006",
                    "reference_id": "73752a39e2a6e38eee3ba90ece2ded598ea88006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/73752a39e2a6e38eee3ba90ece2ded598ea88006"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7e68d7c640d41d8a371b8f6c2d2682ea437cbe21",
                    "reference_id": "7e68d7c640d41d8a371b8f6c2d2682ea437cbe21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7e68d7c640d41d8a371b8f6c2d2682ea437cbe21"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a3593082e0dadf87f17ea4ca9fa0210caaa2aebf",
                    "reference_id": "a3593082e0dadf87f17ea4ca9fa0210caaa2aebf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a3593082e0dadf87f17ea4ca9fa0210caaa2aebf"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/db8d32d6b25fdb75c387daee496b96209d477780",
                    "reference_id": "db8d32d6b25fdb75c387daee496b96209d477780",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/db8d32d6b25fdb75c387daee496b96209d477780"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53229"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mj87-myus-3kcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66967?format=api",
            "vulnerability_id": "VCID-mpr7-f7sr-5bf8",
            "summary": "kernel: drm/i915: Fix system suspend without fbdev being initialized",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53678.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53678.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402217",
                    "reference_id": "2402217",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402217"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53678"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpr7-f7sr-5bf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70708?format=api",
            "vulnerability_id": "VCID-mqhp-j996-13hv",
            "summary": "kernel: net: fix NULL pointer in skb_segment_list",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52991.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52991.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20168",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2003",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30875",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/046de74f9af92ae9ffce75fa22a1795223f4fb54",
                    "reference_id": "046de74f9af92ae9ffce75fa22a1795223f4fb54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/046de74f9af92ae9ffce75fa22a1795223f4fb54"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355500",
                    "reference_id": "2355500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355500"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6446369fb9f083ce032448c5047da08e298b22e6",
                    "reference_id": "6446369fb9f083ce032448c5047da08e298b22e6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6446369fb9f083ce032448c5047da08e298b22e6"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/876e8ca8366735a604bac86ff7e2732fc9d85d2d",
                    "reference_id": "876e8ca8366735a604bac86ff7e2732fc9d85d2d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/876e8ca8366735a604bac86ff7e2732fc9d85d2d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/888dad6f3e85e3b2f8389bd6478f181efc72534d",
                    "reference_id": "888dad6f3e85e3b2f8389bd6478f181efc72534d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/888dad6f3e85e3b2f8389bd6478f181efc72534d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52991"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqhp-j996-13hv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75562?format=api",
            "vulnerability_id": "VCID-mrkb-fhj6-kygd",
            "summary": "kernel: seg6: fix the iif in the IPv6 socket control block",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47515.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47515.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-47515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02618",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02818",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02669",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02678",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02791",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02782",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02771",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0283",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02704",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02714",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02734",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02705",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02691",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02688",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-47515"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283436",
                    "reference_id": "2283436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283436"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6431e71093f3da586a00c6d931481ffb0dc2db0e",
                    "reference_id": "6431e71093f3da586a00c6d931481ffb0dc2db0e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6431e71093f3da586a00c6d931481ffb0dc2db0e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/666521b3852d2b2f52d570f9122b1e4b50d96831",
                    "reference_id": "666521b3852d2b2f52d570f9122b1e4b50d96831",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/666521b3852d2b2f52d570f9122b1e4b50d96831"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1",
                    "reference_id": "98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ae68d93354e5bf5191ee673982251864ea24dd5c",
                    "reference_id": "ae68d93354e5bf5191ee673982251864ea24dd5c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ae68d93354e5bf5191ee673982251864ea24dd5c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b16d412e5f79734033df04e97d7ea2f50a8e9fe3",
                    "reference_id": "b16d412e5f79734033df04e97d7ea2f50a8e9fe3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b16d412e5f79734033df04e97d7ea2f50a8e9fe3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ef8804e47c0a44ae106ead1740408af5ea6c6ee9",
                    "reference_id": "ef8804e47c0a44ae106ead1740408af5ea6c6ee9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:33Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ef8804e47c0a44ae106ead1740408af5ea6c6ee9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-47515"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrkb-fhj6-kygd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67946?format=api",
            "vulnerability_id": "VCID-myjf-uqfn-b7bs",
            "summary": "kernel: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53254.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53254.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03076",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02931",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02942",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03063",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03058",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03048",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03092",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03157",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0316",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03164",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0319",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02989",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02956",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53254"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/198102c9103fc78d8478495971947af77edb05c1",
                    "reference_id": "198102c9103fc78d8478495971947af77edb05c1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/198102c9103fc78d8478495971947af77edb05c1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395386",
                    "reference_id": "2395386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395386"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2f588d0345d69a35e451077afed428fd057a5e34",
                    "reference_id": "2f588d0345d69a35e451077afed428fd057a5e34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2f588d0345d69a35e451077afed428fd057a5e34"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dea49f2993f57d8a2df2cacb0bf649ef49b28879",
                    "reference_id": "dea49f2993f57d8a2df2cacb0bf649ef49b28879",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dea49f2993f57d8a2df2cacb0bf649ef49b28879"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53254"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myjf-uqfn-b7bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67934?format=api",
            "vulnerability_id": "VCID-myxg-t4ps-p7ew",
            "summary": "kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53245",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05261",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05322",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05286",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06378",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06085",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06079",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06071",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06036",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06045",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06194",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06208",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0624",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06248",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06266",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53245"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050",
                    "reference_id": "048ebc9a28fb918ee635dd4b2fcf4248eb6e4050",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22",
                    "reference_id": "1678408d08f31a694d5150a56796dd04c9710b22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881",
                    "reference_id": "175544ad48cbf56affeef2a679c6a4d4fb1e2881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395372",
                    "reference_id": "2395372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395372"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469",
                    "reference_id": "311db605e07f0d4fc0cc7ddb74f1e5692ea2f469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264",
                    "reference_id": "763c06565055ae373fe7f89c11e1447bd1ded264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d",
                    "reference_id": "7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd",
                    "reference_id": "cd87f4df9865a53807001ed12c0f0420b14ececd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29",
                    "reference_id": "ed70fa5629a8b992a5372d7044d1db1f8fa6de29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604",
                    "reference_id": "RHSA-2023:5604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627",
                    "reference_id": "RHSA-2023:5627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5627"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53245"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myxg-t4ps-p7ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69278?format=api",
            "vulnerability_id": "VCID-n1xe-nu5f-ybg7",
            "summary": "kernel: NFSv4/pnfs: Fix a use-after-free bug in open",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06385",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06428",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06466",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06488",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19761",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19811",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19806",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19776",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19685",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50072"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50072"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373562",
                    "reference_id": "2373562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373562"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000",
                    "reference_id": "RHSA-2024:7000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7000"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50072"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1xe-nu5f-ybg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67881?format=api",
            "vulnerability_id": "VCID-n2ke-u9j1-s3gh",
            "summary": "kernel: memory: of: Fix refcount leak bug in of_get_ddr_timings()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50249.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50249.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03717",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03649",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50249"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50249"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395318",
                    "reference_id": "2395318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395318"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50249"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n2ke-u9j1-s3gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67797?format=api",
            "vulnerability_id": "VCID-n3hc-9st6-jfb1",
            "summary": "kernel: drm/vkms: Fix memory leak in vkms_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50269.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50269.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04278",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04236",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50269"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395226",
                    "reference_id": "2395226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395226"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13960",
                    "reference_id": "RHSA-2025:13960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13960"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13961",
                    "reference_id": "RHSA-2025:13961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13961"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15658",
                    "reference_id": "RHSA-2025:15658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15670",
                    "reference_id": "RHSA-2025:15670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15670"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50269"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3hc-9st6-jfb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66132?format=api",
            "vulnerability_id": "VCID-n3qd-gb3t-nfa6",
            "summary": "kernel: PCI: Fix dropping valid root bus resources with .end = zero",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06291",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53814"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420298",
                    "reference_id": "2420298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53814"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3qd-gb3t-nfa6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66090?format=api",
            "vulnerability_id": "VCID-n5sq-sfyw-wkbr",
            "summary": "kernel: dm flakey: fix a crash with invalid table line",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12422",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19739",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19753",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19648",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420253",
                    "reference_id": "2420253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53786"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n5sq-sfyw-wkbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65455?format=api",
            "vulnerability_id": "VCID-n86h-xjhp-s3c8",
            "summary": "kernel: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54286.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54286.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426235",
                    "reference_id": "2426235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54286"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n86h-xjhp-s3c8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67209?format=api",
            "vulnerability_id": "VCID-nc4u-q2z2-nue5",
            "summary": "kernel: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53563.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53563.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53563",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53563"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401571",
                    "reference_id": "2401571",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401571"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53563"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nc4u-q2z2-nue5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69863?format=api",
            "vulnerability_id": "VCID-nckb-8ueh-r7gx",
            "summary": "kernel: scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53038.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53038.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17825",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17731",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17704",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17652",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17597",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17605",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17641",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17552",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17461",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17325",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17416",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53038"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363756",
                    "reference_id": "2363756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53038"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nckb-8ueh-r7gx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69798?format=api",
            "vulnerability_id": "VCID-ncm1-gdwz-fkeq",
            "summary": "kernel: dm crypt: add cond_resched() to dmcrypt_write()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53051.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53051.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13096",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12942",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13447",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13451",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13422",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13319",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1907",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19023",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18925",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18939",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19162",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19214",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363688",
                    "reference_id": "2363688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53051"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ncm1-gdwz-fkeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78256?format=api",
            "vulnerability_id": "VCID-netb-fxrv-zyft",
            "summary": "kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01293",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01297",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01457",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01467",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01472",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01461",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01462",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0145",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01465",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01669",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0168",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01676",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01568",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0146",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3772"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943",
                    "reference_id": "2218943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6415-1/",
                    "reference_id": "USN-6415-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6415-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6439-1/",
                    "reference_id": "USN-6439-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6439-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6439-2/",
                    "reference_id": "USN-6439-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6439-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-1/",
                    "reference_id": "USN-6440-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-2/",
                    "reference_id": "USN-6440-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6440-3/",
                    "reference_id": "USN-6440-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6440-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6462-1/",
                    "reference_id": "USN-6462-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6462-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6462-2/",
                    "reference_id": "USN-6462-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6462-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6464-1/",
                    "reference_id": "USN-6464-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6464-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6465-1/",
                    "reference_id": "USN-6465-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6465-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6465-2/",
                    "reference_id": "USN-6465-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6465-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6465-3/",
                    "reference_id": "USN-6465-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6465-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6516-1/",
                    "reference_id": "USN-6516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6520-1/",
                    "reference_id": "USN-6520-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6520-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3772"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-netb-fxrv-zyft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67693?format=api",
            "vulnerability_id": "VCID-nfg3-jgk3-z7bk",
            "summary": "kernel: blk-mq: fix NULL dereference on q->elevator in blk_mq_elv_switch_none",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53292.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53292.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53292",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0416",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04241",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04176",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04195",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04235",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04214",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0418",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04196",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04242",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04042",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53292"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395679",
                    "reference_id": "2395679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395679"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/245165658e1c9f95c0fecfe02b9b1ebd30a1198a",
                    "reference_id": "245165658e1c9f95c0fecfe02b9b1ebd30a1198a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:11:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/245165658e1c9f95c0fecfe02b9b1ebd30a1198a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3e977386521b71471e66ec2ba82efdfcc456adf2",
                    "reference_id": "3e977386521b71471e66ec2ba82efdfcc456adf2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:11:24Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3e977386521b71471e66ec2ba82efdfcc456adf2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53292"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfg3-jgk3-z7bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78286?format=api",
            "vulnerability_id": "VCID-nfmn-7pq2-hyhf",
            "summary": "kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20124",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20368",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20311",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20299",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20302",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.203",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20177",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20172",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20139",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20052",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21842",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21931",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21697",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21831",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221609",
                    "reference_id": "2221609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221609"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::nfv",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::realtime",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4273",
                    "reference_id": "CVE-2023-4273",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4273"
                },
                {
                    "reference_url": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/",
                    "reference_id": "cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:41Z/"
                        }
                    ],
                    "url": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6343-1/",
                    "reference_id": "USN-6343-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6343-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-1/",
                    "reference_id": "USN-6416-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-2/",
                    "reference_id": "USN-6416-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-3/",
                    "reference_id": "USN-6416-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-1/",
                    "reference_id": "USN-6445-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-2/",
                    "reference_id": "USN-6445-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4273"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfmn-7pq2-hyhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67578?format=api",
            "vulnerability_id": "VCID-ng6v-zjsu-gugc",
            "summary": "kernel: media: uvcvideo: Handle cameras with invalid descriptors",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53437.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53437.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02476",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02491",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02489",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0248",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0252",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02507",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53437"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396504",
                    "reference_id": "2396504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53437"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ng6v-zjsu-gugc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67633?format=api",
            "vulnerability_id": "VCID-nmbm-csgm-z7g7",
            "summary": "kernel: wifi: wilc1000: add missing unregister_netdev() in wilc_netdev_ifc_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50361.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50361.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396119",
                    "reference_id": "2396119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396119"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2b88974ecb358990e1c33fabcd0b9e142bab7f21",
                    "reference_id": "2b88974ecb358990e1c33fabcd0b9e142bab7f21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:33:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2b88974ecb358990e1c33fabcd0b9e142bab7f21"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6da6ce086221803ed6c3b1db11096cecd3e58ec8",
                    "reference_id": "6da6ce086221803ed6c3b1db11096cecd3e58ec8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:33:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6da6ce086221803ed6c3b1db11096cecd3e58ec8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a1bdecedc7ad0512365267cd1a26bfc2ae455c59",
                    "reference_id": "a1bdecedc7ad0512365267cd1a26bfc2ae455c59",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:33:30Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a1bdecedc7ad0512365267cd1a26bfc2ae455c59"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50361"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmbm-csgm-z7g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67372?format=api",
            "vulnerability_id": "VCID-nmbx-wx99-6kcj",
            "summary": "kernel: mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50464.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50464.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50464",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50464"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400807",
                    "reference_id": "2400807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50464"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmbx-wx99-6kcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70054?format=api",
            "vulnerability_id": "VCID-npga-qv8p-afef",
            "summary": "kernel: bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49875.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49875.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16212",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16273",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16068",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16041",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15976",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15972",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15931",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15813",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15924",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49875"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363423",
                    "reference_id": "2363423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49875"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npga-qv8p-afef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70097?format=api",
            "vulnerability_id": "VCID-nq4d-sqqs-3kfq",
            "summary": "kernel: bpf: Fix wrong reg type conversion in release_reference()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49873.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49873.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16212",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15924",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16041",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15976",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15972",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15931",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15813",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16273",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16068",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.162",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49873"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49873"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363467",
                    "reference_id": "2363467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363467"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/466ce46f251dfb259a8cbaa895ab9edd6fb56240",
                    "reference_id": "466ce46f251dfb259a8cbaa895ab9edd6fb56240",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:03:43Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/466ce46f251dfb259a8cbaa895ab9edd6fb56240"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ae5ccad6c711db0f2ca1231be051935dd128b8f5",
                    "reference_id": "ae5ccad6c711db0f2ca1231be051935dd128b8f5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:03:43Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ae5ccad6c711db0f2ca1231be051935dd128b8f5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cedd4f01f67be94735f15123158f485028571037",
                    "reference_id": "cedd4f01f67be94735f15123158f485028571037",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:03:43Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cedd4f01f67be94735f15123158f485028571037"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f1db20814af532f85e091231223e5e4818e8464b",
                    "reference_id": "f1db20814af532f85e091231223e5e4818e8464b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:03:43Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f1db20814af532f85e091231223e5e4818e8464b"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49873"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nq4d-sqqs-3kfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67862?format=api",
            "vulnerability_id": "VCID-nqtn-45jw-7qc5",
            "summary": "kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53185.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53185.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03717",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03649",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53185"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395297",
                    "reference_id": "2395297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051",
                    "reference_id": "RHSA-2025:21051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083",
                    "reference_id": "RHSA-2025:21083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21084",
                    "reference_id": "RHSA-2025:21084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091",
                    "reference_id": "RHSA-2025:21091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128",
                    "reference_id": "RHSA-2025:21128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136",
                    "reference_id": "RHSA-2025:21136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752",
                    "reference_id": "RHSA-2025:22752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22752"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53185"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqtn-45jw-7qc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67806?format=api",
            "vulnerability_id": "VCID-nukc-v8yh-wqdc",
            "summary": "kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395235",
                    "reference_id": "2395235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458",
                    "reference_id": "RHSA-2023:2458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789",
                    "reference_id": "RHSA-2023:4789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50318"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nukc-v8yh-wqdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75983?format=api",
            "vulnerability_id": "VCID-p22p-bhwt-h3gy",
            "summary": "kernel: net: sched: sch: Bounds check priority",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52734.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282728",
                    "reference_id": "2282728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282728"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52734"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p22p-bhwt-h3gy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71619?format=api",
            "vulnerability_id": "VCID-p435-uh5e-xyht",
            "summary": "kernel: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49731.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49731.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01088",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01093",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01035",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0102",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01015",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01014",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01008",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01017",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01076",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01078",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01081",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01082",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08089",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08046",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49731"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/07cbdb4807d369fbda73062a91b570c4dc5ec429",
                    "reference_id": "07cbdb4807d369fbda73062a91b570c4dc5ec429",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/07cbdb4807d369fbda73062a91b570c4dc5ec429"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1ac5efee33f29e704226506d429b84575a5d66f8",
                    "reference_id": "1ac5efee33f29e704226506d429b84575a5d66f8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1ac5efee33f29e704226506d429b84575a5d66f8"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348194",
                    "reference_id": "2348194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348194"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/253334f84c81bc6a43af489f108c0bddad989eef",
                    "reference_id": "253334f84c81bc6a43af489f108c0bddad989eef",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/253334f84c81bc6a43af489f108c0bddad989eef"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a",
                    "reference_id": "36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a810bd5af06977a847d1f202b22d7defd5c62497",
                    "reference_id": "a810bd5af06977a847d1f202b22d7defd5c62497",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a810bd5af06977a847d1f202b22d7defd5c62497"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bf476fe22aa1851bab4728e0c49025a6a0bea307",
                    "reference_id": "bf476fe22aa1851bab4728e0c49025a6a0bea307",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bf476fe22aa1851bab4728e0c49025a6a0bea307"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ca4693e6e06e4fd2b240c0fec47aa2498c94848e",
                    "reference_id": "ca4693e6e06e4fd2b240c0fec47aa2498c94848e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ca4693e6e06e4fd2b240c0fec47aa2498c94848e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ff128fbea720bf763fa345680dda5f050bc24a47",
                    "reference_id": "ff128fbea720bf763fa345680dda5f050bc24a47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:31:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ff128fbea720bf763fa345680dda5f050bc24a47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49731"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p435-uh5e-xyht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70039?format=api",
            "vulnerability_id": "VCID-p4nh-n2cr-uug9",
            "summary": "kernel: KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49882.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49882.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23164",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23141",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23158",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2315",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22935",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22928",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22927",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22823",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22906",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49882"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363408",
                    "reference_id": "2363408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363408"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49882"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4nh-n2cr-uug9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67093?format=api",
            "vulnerability_id": "VCID-p665-8j9c-nqfk",
            "summary": "kernel: IB/mad: Don't call to function that might sleep while in atomic context",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50472"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401455",
                    "reference_id": "2401455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50472"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p665-8j9c-nqfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67849?format=api",
            "vulnerability_id": "VCID-p72b-szhh-wyd6",
            "summary": "kernel: rxrpc: Make it so that a waiting process can be aborted",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53218.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53218.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03671",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03685",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0482",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04786",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04859",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04872",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0487",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04918",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04705",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04672",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04639",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53218"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0eb362d254814ce04848730bf32e75b8ee1a4d6c",
                    "reference_id": "0eb362d254814ce04848730bf32e75b8ee1a4d6c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:49:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0eb362d254814ce04848730bf32e75b8ee1a4d6c"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395284",
                    "reference_id": "2395284",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395284"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7161cf61c64e9e9413d790f2fa2b9dada71a2249",
                    "reference_id": "7161cf61c64e9e9413d790f2fa2b9dada71a2249",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:49:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7161cf61c64e9e9413d790f2fa2b9dada71a2249"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/876d96faacbc407daf4978d7ec95051b68f5344a",
                    "reference_id": "876d96faacbc407daf4978d7ec95051b68f5344a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:49:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/876d96faacbc407daf4978d7ec95051b68f5344a"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53218"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p72b-szhh-wyd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65304?format=api",
            "vulnerability_id": "VCID-p832-b9r7-r3gs",
            "summary": "kernel: Linux kernel: Denial of Service in RDMA/rxe due to null-pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50885.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50885.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50885"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50885"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426080",
                    "reference_id": "2426080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50885"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p832-b9r7-r3gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66078?format=api",
            "vulnerability_id": "VCID-pa7v-4ecc-k3a2",
            "summary": "kernel: scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08811",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420240",
                    "reference_id": "2420240",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420240"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10772",
                    "reference_id": "RHSA-2024:10772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10772"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53803"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pa7v-4ecc-k3a2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65704?format=api",
            "vulnerability_id": "VCID-pegm-6qzf-g3az",
            "summary": "kernel: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50771.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50771.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50771"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50771"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425092",
                    "reference_id": "2425092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50771"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pegm-6qzf-g3az"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67656?format=api",
            "vulnerability_id": "VCID-pex6-rhfb-xqgb",
            "summary": "kernel: USB: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53359.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53359.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03915",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53359"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396144",
                    "reference_id": "2396144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396144"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/30374434edab20e25776f8ecb4bc9d1e54309487",
                    "reference_id": "30374434edab20e25776f8ecb4bc9d1e54309487",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/30374434edab20e25776f8ecb4bc9d1e54309487"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6683327b51a601daba32900072349dfa1d4e8fea",
                    "reference_id": "6683327b51a601daba32900072349dfa1d4e8fea",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6683327b51a601daba32900072349dfa1d4e8fea"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c68ece7baf2aa9783b8244482c03010d477d4a93",
                    "reference_id": "c68ece7baf2aa9783b8244482c03010d477d4a93",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c68ece7baf2aa9783b8244482c03010d477d4a93"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cc00340fb1226a2a3a5cf15473ac417da3c952f1",
                    "reference_id": "cc00340fb1226a2a3a5cf15473ac417da3c952f1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cc00340fb1226a2a3a5cf15473ac417da3c952f1"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53359"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pex6-rhfb-xqgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67125?format=api",
            "vulnerability_id": "VCID-pfe5-kx4z-43bf",
            "summary": "kernel: wifi: iwlwifi: mvm: fix potential array out of bounds access",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04797",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04846",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04801",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04941",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04981",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04753",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04762",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05881",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53575"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401487",
                    "reference_id": "2401487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53575"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfe5-kx4z-43bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69840?format=api",
            "vulnerability_id": "VCID-phw9-bpnj-nub2",
            "summary": "kernel: net/mlx5: Fix steering rules cleanup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53079.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53079.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15361",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15382",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15424",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15422",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15366",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15233",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29486",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29434",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29454",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29426",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29528",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29554",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29425",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29487",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363732",
                    "reference_id": "2363732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53079"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-phw9-bpnj-nub2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69801?format=api",
            "vulnerability_id": "VCID-pk53-yb33-ubbb",
            "summary": "kernel: tcp: tcp_make_synack() can be called from process context",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53121.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53121.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53121"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363691",
                    "reference_id": "2363691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363691"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53121"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pk53-yb33-ubbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65240?format=api",
            "vulnerability_id": "VCID-pmfa-2cjv-uucv",
            "summary": "kernel: SUNRPC: double free xprt_ctxt while still in use",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54269.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54269.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54269"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426013",
                    "reference_id": "2426013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426013"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000",
                    "reference_id": "RHSA-2024:7000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7000"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54269"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmfa-2cjv-uucv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70127?format=api",
            "vulnerability_id": "VCID-ppbz-jvz8-b7eb",
            "summary": "kernel: KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21987",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49774"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363497",
                    "reference_id": "2363497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49774"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppbz-jvz8-b7eb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70723?format=api",
            "vulnerability_id": "VCID-pqcv-y7p5-bqad",
            "summary": "kernel: mm/hugetlb: fix PTE marker handling in hugetlb_change_protection()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.264",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30825",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49760"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355517",
                    "reference_id": "2355517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49760"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqcv-y7p5-bqad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66941?format=api",
            "vulnerability_id": "VCID-pqja-9s5g-nkbe",
            "summary": "kernel: wifi: ath9k: hif_usb: fix memory leak of remain_skbs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02807",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02798",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02888",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02794",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04032",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04047",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402188",
                    "reference_id": "2402188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53641"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqja-9s5g-nkbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67168?format=api",
            "vulnerability_id": "VCID-puv9-kjvp-1qbt",
            "summary": "kernel: cpufreq: Init completion before kobject_init_and_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50473.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50473.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50473"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401530",
                    "reference_id": "2401530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769",
                    "reference_id": "RHSA-2020:1769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50473"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-puv9-kjvp-1qbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67812?format=api",
            "vulnerability_id": "VCID-pvhm-mt27-gfe6",
            "summary": "kernel: Linux kernel: Denial of Service due to use-after-free in BFQ scheduler",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50329.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50329.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50329",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04264",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04283",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04317",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04332",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04195",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04123",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50329"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50329",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50329"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395242",
                    "reference_id": "2395242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50329"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvhm-mt27-gfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69856?format=api",
            "vulnerability_id": "VCID-pwsz-e7j6-nbch",
            "summary": "kernel: mptcp: use the workqueue to destroy unaccepted sockets",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16114",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16132",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1617",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15899",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16012",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53072"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363749",
                    "reference_id": "2363749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363749"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53072"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwsz-e7j6-nbch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69192?format=api",
            "vulnerability_id": "VCID-pxgn-k7ge-43h9",
            "summary": "kernel: virtio-blk: Avoid use-after-free on suspend/resume",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50064.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50064.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50064",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08191",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08286",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08277",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08257",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22906",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23158",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2315",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22935",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22928",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22927",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22823",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50064"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373475",
                    "reference_id": "2373475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50064"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pxgn-k7ge-43h9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67167?format=api",
            "vulnerability_id": "VCID-py6r-aqaw-73hg",
            "summary": "kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50475"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401529",
                    "reference_id": "2401529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1988",
                    "reference_id": "RHSA-2022:1988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50475"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-py6r-aqaw-73hg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78471?format=api",
            "vulnerability_id": "VCID-pyu4-rsap-2fhx",
            "summary": "kernel: out-of-bounds access in relay_file_read",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00622",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00615",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0061",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00616",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00739",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00689",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00682",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0073",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00732",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215502",
                    "reference_id": "2215502",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215502"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
                    "reference_id": "ChangeLog-6.3.2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5448",
                    "reference_id": "dsa-5448",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5448"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5480",
                    "reference_id": "dsa-5480",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5480"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
                    "reference_id": "?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
                    "reference_id": "msg00030.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230824-0006/",
                    "reference_id": "ntap-20230824-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230824-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250",
                    "reference_id": "RHSA-2024:1250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306",
                    "reference_id": "RHSA-2024:1306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1306"
                },
                {
                    "reference_url": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/",
                    "reference_id": "T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"
                        }
                    ],
                    "url": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6252-1/",
                    "reference_id": "USN-6252-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6252-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6254-1/",
                    "reference_id": "USN-6254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6254-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6283-1/",
                    "reference_id": "USN-6283-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6283-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6340-1/",
                    "reference_id": "USN-6340-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6340-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6340-2/",
                    "reference_id": "USN-6340-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6340-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6349-1/",
                    "reference_id": "USN-6349-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6349-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6357-1/",
                    "reference_id": "USN-6357-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6357-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6397-1/",
                    "reference_id": "USN-6397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3268"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyu4-rsap-2fhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79714?format=api",
            "vulnerability_id": "VCID-q3ng-jsdd-vffp",
            "summary": "kernel: missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1249.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1249.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14375",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14292",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14486",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14419",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16717",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16767",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16731",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16599",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16848",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1685",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16879",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16782",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1249"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1249"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169719",
                    "reference_id": "2169719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169719"
                },
                {
                    "reference_url": "https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org/",
                    "reference_id": "87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:35Z/"
                        }
                    ],
                    "url": "https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html",
                    "reference_id": "CentOS-Stream-9-Missing-Kernel-Security-Fix.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:35Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1249"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3ng-jsdd-vffp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66161?format=api",
            "vulnerability_id": "VCID-q4yu-2hyt-9yep",
            "summary": "kernel: cpufreq: qcom: fix memory leak in error path",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50658"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420335",
                    "reference_id": "2420335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50658"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4yu-2hyt-9yep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65725?format=api",
            "vulnerability_id": "VCID-q54u-yfc2-w7bb",
            "summary": "kernel: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425113",
                    "reference_id": "2425113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54108"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q54u-yfc2-w7bb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65616?format=api",
            "vulnerability_id": "VCID-qa3a-a7pr-x3a2",
            "summary": "kernel: Linux kernel: Denial of Service in ice driver via uninitialized transmit rings",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50710.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50710.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50710"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425001",
                    "reference_id": "2425001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425001"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50710"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa3a-a7pr-x3a2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70667?format=api",
            "vulnerability_id": "VCID-qcbg-g6j5-zybp",
            "summary": "kernel: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49752.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49752.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05263",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0524",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05296",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05181",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07095",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07191",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.072",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07172",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0722",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22538",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25733",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49752"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355453",
                    "reference_id": "2355453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355453"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/39af728649b05e88a2b40e714feeee6451c3f18e",
                    "reference_id": "39af728649b05e88a2b40e714feeee6451c3f18e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/39af728649b05e88a2b40e714feeee6451c3f18e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7701a4bd45c11f9a289d8f262fad05705a012339",
                    "reference_id": "7701a4bd45c11f9a289d8f262fad05705a012339",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7701a4bd45c11f9a289d8f262fad05705a012339"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e0472947bead3af94cc968ce35fc0414803a2f65",
                    "reference_id": "e0472947bead3af94cc968ce35fc0414803a2f65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e0472947bead3af94cc968ce35fc0414803a2f65"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e75485fc589ec729cc182aa9b41dfb6c15ae6f6e",
                    "reference_id": "e75485fc589ec729cc182aa9b41dfb6c15ae6f6e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e75485fc589ec729cc182aa9b41dfb6c15ae6f6e"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49752"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qcbg-g6j5-zybp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65632?format=api",
            "vulnerability_id": "VCID-qdc8-tftu-afcw",
            "summary": "kernel: Linux kernel: Denial of Service in mlx5e due to incorrect encap attribute handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54074"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425019",
                    "reference_id": "2425019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54074"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdc8-tftu-afcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73455?format=api",
            "vulnerability_id": "VCID-qjze-fde3-v7eq",
            "summary": "kernel: ixgbevf: Fix resource leak in ixgbevf_init_module()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03653",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03627",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03631",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03677",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03632",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03569",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0358",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03604",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03561",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03482",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03494",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320673",
                    "reference_id": "2320673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320673"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a",
                    "reference_id": "7109e941099244cc876a4b3cb7a3ec79f104374a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181",
                    "reference_id": "8cfa238a48f34038464b99d0b4825238c2687181",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2",
                    "reference_id": "c99671d4699dcf90d6939923c8fe8a8918e140b2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d",
                    "reference_id": "f166c62cad798c53300b4b327e44300c73ec492d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49028"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjze-fde3-v7eq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67268?format=api",
            "vulnerability_id": "VCID-qmt9-fadf-h3gs",
            "summary": "kernel: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53466"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400700",
                    "reference_id": "2400700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400700"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53466"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmt9-fadf-h3gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67698?format=api",
            "vulnerability_id": "VCID-qnpz-8gsp-5yc5",
            "summary": "kernel: ASoC: fsl_mqs: move of_node_put() to the correct location",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53268.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53268.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53268"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1bdb4a5ccab2316935ce4ad4fd4df8d36f0ffc6e",
                    "reference_id": "1bdb4a5ccab2316935ce4ad4fd4df8d36f0ffc6e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1bdb4a5ccab2316935ce4ad4fd4df8d36f0ffc6e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1c34890273a020d61d6127ade3f68ed1cb21c16a",
                    "reference_id": "1c34890273a020d61d6127ade3f68ed1cb21c16a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1c34890273a020d61d6127ade3f68ed1cb21c16a"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395685",
                    "reference_id": "2395685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395685"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/402299cca89273b62384b5f9645ea49cd5fc4a57",
                    "reference_id": "402299cca89273b62384b5f9645ea49cd5fc4a57",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/402299cca89273b62384b5f9645ea49cd5fc4a57"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6a129c0e9935112ecf2ffb6de98f83b8fd090c86",
                    "reference_id": "6a129c0e9935112ecf2ffb6de98f83b8fd090c86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6a129c0e9935112ecf2ffb6de98f83b8fd090c86"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9a2585088a7d6f98a5a910f5b4b74b6d24e63156",
                    "reference_id": "9a2585088a7d6f98a5a910f5b4b74b6d24e63156",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9a2585088a7d6f98a5a910f5b4b74b6d24e63156"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b5a6930fc6a432e32714c4ed3c597077d999cf6d",
                    "reference_id": "b5a6930fc6a432e32714c4ed3c597077d999cf6d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b5a6930fc6a432e32714c4ed3c597077d999cf6d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53268"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qnpz-8gsp-5yc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65463?format=api",
            "vulnerability_id": "VCID-qs5p-ey6g-vkhr",
            "summary": "kernel: Linux kernel: Memory leak in ath11k Wi-Fi driver leads to Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54275.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54275.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54275"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426243",
                    "reference_id": "2426243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54275"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs5p-ey6g-vkhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69855?format=api",
            "vulnerability_id": "VCID-qt3j-m3ww-33bu",
            "summary": "kernel: igb: revert rtnl_lock() that causes deadlock",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53060.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53060.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15166",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15038",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15107",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15046",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14945",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14955",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15008",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15049",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14991",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14861",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14987",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53060"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363748",
                    "reference_id": "2363748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53060"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3j-m3ww-33bu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67811?format=api",
            "vulnerability_id": "VCID-qu5p-6z4k-pbe4",
            "summary": "kernel: ext4: Fix function prototype mismatch for ext4_feat_ktype",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53224.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53224.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53224"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a",
                    "reference_id": "0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/118901ad1f25d2334255b3d50512fa20591531cd",
                    "reference_id": "118901ad1f25d2334255b3d50512fa20591531cd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/118901ad1f25d2334255b3d50512fa20591531cd"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1ba10d3640e9783dad811fe4e24d55465c37c64d",
                    "reference_id": "1ba10d3640e9783dad811fe4e24d55465c37c64d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1ba10d3640e9783dad811fe4e24d55465c37c64d"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395241",
                    "reference_id": "2395241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395241"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2b69cdd9f9a7f596e3dd31f05f9852940d177924",
                    "reference_id": "2b69cdd9f9a7f596e3dd31f05f9852940d177924",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2b69cdd9f9a7f596e3dd31f05f9852940d177924"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/94d8de83286fb1827340eba35b61c308f6b46ead",
                    "reference_id": "94d8de83286fb1827340eba35b61c308f6b46ead",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/94d8de83286fb1827340eba35b61c308f6b46ead"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71",
                    "reference_id": "99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c98077f7598a562f51051eec043be0cb3e1b1b5e",
                    "reference_id": "c98077f7598a562f51051eec043be0cb3e1b1b5e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c98077f7598a562f51051eec043be0cb3e1b1b5e"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53224"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu5p-6z4k-pbe4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66129?format=api",
            "vulnerability_id": "VCID-qv16-3sqj-h3hc",
            "summary": "kernel: io-wq: Fix memory leak in worker creation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50639.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50639.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50639"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420295",
                    "reference_id": "2420295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50639"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv16-3sqj-h3hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67979?format=api",
            "vulnerability_id": "VCID-qvme-7b38-xbd1",
            "summary": "kernel: Linux kernel: Memory leak in driver core location can lead to denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53211.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53211.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53211"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0d150f967e8410e1e6712484543eec709356a65d",
                    "reference_id": "0d150f967e8410e1e6712484543eec709356a65d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0d150f967e8410e1e6712484543eec709356a65d"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395422",
                    "reference_id": "2395422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395422"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5a9de90951bbeaed775e4b8d1b16b4d359e82bf5",
                    "reference_id": "5a9de90951bbeaed775e4b8d1b16b4d359e82bf5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5a9de90951bbeaed775e4b8d1b16b4d359e82bf5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90",
                    "reference_id": "8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53211"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qvme-7b38-xbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65645?format=api",
            "vulnerability_id": "VCID-qzjj-xut2-hfcd",
            "summary": "kernel: usb: idmouse: fix an uninit-value in idmouse_open",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50733.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50733.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50733"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425032",
                    "reference_id": "2425032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425032"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50733"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzjj-xut2-hfcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69899?format=api",
            "vulnerability_id": "VCID-r3u8-3w6a-eqh1",
            "summary": "kernel: drm/amd/display: Do not set DRR on pipe Commit",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53042.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53042.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363793",
                    "reference_id": "2363793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363793"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53042"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3u8-3w6a-eqh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78561?format=api",
            "vulnerability_id": "VCID-r51v-h1rb-qqdr",
            "summary": "kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04435",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04695",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04449",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04458",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04595",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0467",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04696",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04659",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04461",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04473",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04507",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04523",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04512",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04497",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192667",
                    "reference_id": "2192667",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192667"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9",
                    "reference_id": "ChangeLog-6.2.9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"
                        }
                    ],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
                    "reference_id": "?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1210685",
                    "reference_id": "show_bug.cgi?id=1210685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1210685"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6175-1/",
                    "reference_id": "USN-6175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6186-1/",
                    "reference_id": "USN-6186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6186-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6284-1/",
                    "reference_id": "USN-6284-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6284-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6301-1/",
                    "reference_id": "USN-6301-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6301-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6312-1/",
                    "reference_id": "USN-6312-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6312-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6314-1/",
                    "reference_id": "USN-6314-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6314-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6337-1/",
                    "reference_id": "USN-6337-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6337-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-33203"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r51v-h1rb-qqdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67144?format=api",
            "vulnerability_id": "VCID-r7zk-mxam-rkhj",
            "summary": "kernel: net: wwan: iosm: fix NULL pointer dereference when removing device",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53561.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53561.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53561",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53561"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401506",
                    "reference_id": "2401506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53561"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7zk-mxam-rkhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67002?format=api",
            "vulnerability_id": "VCID-rdju-9nxs-33d4",
            "summary": "kernel: ext4: fix possible double unlock when moving a directory",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03499",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53626"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402253",
                    "reference_id": "2402253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53626"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdju-9nxs-33d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78609?format=api",
            "vulnerability_id": "VCID-renx-7s4p-puaa",
            "summary": "kernel: Use after free bug in r592_remove",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00718",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00824",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00792",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00791",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00781",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00775",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00777",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00825",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00828",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00829",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "8e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00826",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213199",
                    "reference_id": "2213199",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213199"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4",
                    "reference_id": "ChangeLog-6.3.4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
                    "reference_id": "?id=63264422785021704c39b38f65a78ab9e4a186d7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
                    "reference_id": "msg00030.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230706-0004/",
                    "reference_id": "ntap-20230706-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230706-0004/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                },
                {
                    "reference_url": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/",
                    "reference_id": "t",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"
                        }
                    ],
                    "url": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6231-1/",
                    "reference_id": "USN-6231-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6231-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6252-1/",
                    "reference_id": "USN-6252-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6252-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6254-1/",
                    "reference_id": "USN-6254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6254-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6260-1/",
                    "reference_id": "USN-6260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6260-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6283-1/",
                    "reference_id": "USN-6283-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6283-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6284-1/",
                    "reference_id": "USN-6284-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6284-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6301-1/",
                    "reference_id": "USN-6301-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6301-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6312-1/",
                    "reference_id": "USN-6312-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6312-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6314-1/",
                    "reference_id": "USN-6314-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6314-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6337-1/",
                    "reference_id": "USN-6337-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6337-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-3141"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-renx-7s4p-puaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69366?format=api",
            "vulnerability_id": "VCID-rf49-ywc7-wqdn",
            "summary": "kernel: selinux: fix memleak in security_read_state_kernel()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50201.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50201.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06468",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0652",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50201"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373649",
                    "reference_id": "2373649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373649"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50201"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf49-ywc7-wqdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66164?format=api",
            "vulnerability_id": "VCID-rg3c-5apj-guau",
            "summary": "kernel: nvme-core: fix memory leak in dhchap_secret_store",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53852.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53852.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06291",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53852"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420338",
                    "reference_id": "2420338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53852"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rg3c-5apj-guau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67602?format=api",
            "vulnerability_id": "VCID-rhs7-avgn-e7dr",
            "summary": "kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50412.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50412.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03209",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03221",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03251",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0318",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03159",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04462",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04256",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04247",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04493",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04382",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04464",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04401",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04422",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50412"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50412"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396530",
                    "reference_id": "2396530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396530"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3747465c5da7a11957a34bbb9485d9fc253b91cc",
                    "reference_id": "3747465c5da7a11957a34bbb9485d9fc253b91cc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3747465c5da7a11957a34bbb9485d9fc253b91cc"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/40cdb02cb9f965732eb543d47f15bef8d10f0f5f",
                    "reference_id": "40cdb02cb9f965732eb543d47f15bef8d10f0f5f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/40cdb02cb9f965732eb543d47f15bef8d10f0f5f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4d4d5bc659206b187263190ad9a03513f625659d",
                    "reference_id": "4d4d5bc659206b187263190ad9a03513f625659d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4d4d5bc659206b187263190ad9a03513f625659d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/86ae5170786aea3e1751123ca55700fb9b37b623",
                    "reference_id": "86ae5170786aea3e1751123ca55700fb9b37b623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/86ae5170786aea3e1751123ca55700fb9b37b623"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f369fb4deed7ab997cfa703dc85ec08b3adc1af8",
                    "reference_id": "f369fb4deed7ab997cfa703dc85ec08b3adc1af8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f369fb4deed7ab997cfa703dc85ec08b3adc1af8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50412"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhs7-avgn-e7dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65707?format=api",
            "vulnerability_id": "VCID-rjdd-dk1r-subd",
            "summary": "kernel: blk-cgroup: hold queue_lock when removing blkg->q_node",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54088.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54088.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54088"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425095",
                    "reference_id": "2425095",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54088"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjdd-dk1r-subd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70731?format=api",
            "vulnerability_id": "VCID-rkwq-es68-cbev",
            "summary": "kernel: drm/amdkfd: Add sync after creating vram bo",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53009.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53009.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02776",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25334",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53009"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355526",
                    "reference_id": "2355526",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355526"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53009"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkwq-es68-cbev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69827?format=api",
            "vulnerability_id": "VCID-rmxs-29pj-8qbu",
            "summary": "kernel: ice: xsk: disable txq irq before flushing hw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19544",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1948",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19372",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19363",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19324",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19218",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.193",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363719",
                    "reference_id": "2363719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53102"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmxs-29pj-8qbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66248?format=api",
            "vulnerability_id": "VCID-rp47-hypa-7ubz",
            "summary": "kernel: media: dvb-usb: fix memory leak in dvb_usb_adapter_init()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11937",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19739",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19753",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19648",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50626"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419873",
                    "reference_id": "2419873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419873"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50626"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rp47-hypa-7ubz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66198?format=api",
            "vulnerability_id": "VCID-rt98-yj63-bqcj",
            "summary": "kernel: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50675.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50675.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50675"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420374",
                    "reference_id": "2420374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420374"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50675"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt98-yj63-bqcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67855?format=api",
            "vulnerability_id": "VCID-rvan-76qw-b7gd",
            "summary": "kernel: Linux kernel: Denial of Service due to improper io_uring/af_unix file cleanup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50234.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50234.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04323",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04225",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04156",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50234"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50234"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395290",
                    "reference_id": "2395290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50234"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvan-76qw-b7gd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67055?format=api",
            "vulnerability_id": "VCID-rwug-pkf1-9kbb",
            "summary": "kernel: drm/amd/display: Fix potential null-deref in dm_resume",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50535"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402308",
                    "reference_id": "2402308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402308"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50535"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rwug-pkf1-9kbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69813?format=api",
            "vulnerability_id": "VCID-rxc4-gznc-ubh9",
            "summary": "kernel: scsi: mpi3mr: Fix sas_hba.phy memory leak in mpi3mr_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53126.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53126.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53126"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363703",
                    "reference_id": "2363703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53126"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxc4-gznc-ubh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65618?format=api",
            "vulnerability_id": "VCID-ry3f-q2fp-j3c5",
            "summary": "kernel: Linux kernel: Denial of Service due to PCI device reference count leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425005",
                    "reference_id": "2425005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425005"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50718"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ry3f-q2fp-j3c5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78678?format=api",
            "vulnerability_id": "VCID-ryhg-z4qf-kyd6",
            "summary": "kernel: hid: Use After Free in asus_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04312",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04269",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04281",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04328",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05373",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05537",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05571",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05607",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05614",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0537",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06458",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173444",
                    "reference_id": "2173444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173444"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
                    "reference_id": "?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6171-1/",
                    "reference_id": "USN-6171-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6171-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6172-1/",
                    "reference_id": "USN-6172-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6172-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6185-1/",
                    "reference_id": "USN-6185-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6185-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6187-1/",
                    "reference_id": "USN-6187-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6187-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6207-1/",
                    "reference_id": "USN-6207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6223-1/",
                    "reference_id": "USN-6223-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6223-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6604-1/",
                    "reference_id": "USN-6604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6604-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6604-2/",
                    "reference_id": "USN-6604-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6604-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1079"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ryhg-z4qf-kyd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69809?format=api",
            "vulnerability_id": "VCID-s1py-kbbs-k7d7",
            "summary": "kernel: perf/x86/amd/core: Always clear status for idx",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53073"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363699",
                    "reference_id": "2363699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363699"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53073"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s1py-kbbs-k7d7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67214?format=api",
            "vulnerability_id": "VCID-s1xr-sbms-ayds",
            "summary": "kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50482.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50482.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02912",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50482"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401576",
                    "reference_id": "2401576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0832",
                    "reference_id": "RHSA-2023:0832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0832"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50482"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s1xr-sbms-ayds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67663?format=api",
            "vulnerability_id": "VCID-s3kp-f5zp-zfhn",
            "summary": "kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50356.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50356.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04227",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04362",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396152",
                    "reference_id": "2396152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396152"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2a3fc78210b9f0e85372a2435368962009f480fc",
                    "reference_id": "2a3fc78210b9f0e85372a2435368962009f480fc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2a3fc78210b9f0e85372a2435368962009f480fc"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/723399af2795fb95687a531c9480464b5f489333",
                    "reference_id": "723399af2795fb95687a531c9480464b5f489333",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/723399af2795fb95687a531c9480464b5f489333"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c2e1e59d59fafe297779ceae1fe0e6fbebc3e745",
                    "reference_id": "c2e1e59d59fafe297779ceae1fe0e6fbebc3e745",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c2e1e59d59fafe297779ceae1fe0e6fbebc3e745"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ded86c4191a3c17f8200d17a7d8a6f63b74554ae",
                    "reference_id": "ded86c4191a3c17f8200d17a7d8a6f63b74554ae",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ded86c4191a3c17f8200d17a7d8a6f63b74554ae"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051",
                    "reference_id": "RHSA-2025:21051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083",
                    "reference_id": "RHSA-2025:21083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091",
                    "reference_id": "RHSA-2025:21091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128",
                    "reference_id": "RHSA-2025:21128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136",
                    "reference_id": "RHSA-2025:21136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22006",
                    "reference_id": "RHSA-2025:22006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752",
                    "reference_id": "RHSA-2025:22752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445",
                    "reference_id": "RHSA-2025:23445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23947",
                    "reference_id": "RHSA-2025:23947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23947"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23960",
                    "reference_id": "RHSA-2025:23960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23960"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50356"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3kp-f5zp-zfhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78700?format=api",
            "vulnerability_id": "VCID-s4uv-qjv6-n7b8",
            "summary": "kernel: net/tls: tls_is_tx_ready() checked list_entry",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01207",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01126",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01211",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01219",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01212",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01213",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00851",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00852",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00867",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0087",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00868",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00863",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00864",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1075"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173434",
                    "reference_id": "2173434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173434"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
                    "reference_id": "?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:05:50Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5978-1/",
                    "reference_id": "USN-5978-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5978-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6079-1/",
                    "reference_id": "USN-6079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6080-1/",
                    "reference_id": "USN-6080-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6080-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6085-1/",
                    "reference_id": "USN-6085-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6085-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6090-1/",
                    "reference_id": "USN-6090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6090-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6091-1/",
                    "reference_id": "USN-6091-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6091-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6094-1/",
                    "reference_id": "USN-6094-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6094-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6096-1/",
                    "reference_id": "USN-6096-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6096-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6109-1/",
                    "reference_id": "USN-6109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6109-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6118-1/",
                    "reference_id": "USN-6118-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6118-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6132-1/",
                    "reference_id": "USN-6132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6133-1/",
                    "reference_id": "USN-6133-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6133-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1075"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4uv-qjv6-n7b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70705?format=api",
            "vulnerability_id": "VCID-s4zv-a972-6udg",
            "summary": "kernel: VMCI: Use threaded irqs instead of tasklets",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49759.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49759.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06046",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06133",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06094",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06258",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06285",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06297",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06079",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06062",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06102",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07845",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49759"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355497",
                    "reference_id": "2355497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355497"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3daed6345d5880464f46adab871d208e1baa2f3a",
                    "reference_id": "3daed6345d5880464f46adab871d208e1baa2f3a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:22:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3daed6345d5880464f46adab871d208e1baa2f3a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/548ea9dd5e01b0ecf53d2563004c80abd636743d",
                    "reference_id": "548ea9dd5e01b0ecf53d2563004c80abd636743d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:22:23Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/548ea9dd5e01b0ecf53d2563004c80abd636743d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49759"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4zv-a972-6udg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69791?format=api",
            "vulnerability_id": "VCID-sak6-57cj-v3e6",
            "summary": "kernel: scsi: mpi3mr: Fix config page DMA memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53120.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53120.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53120"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363681",
                    "reference_id": "2363681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363681"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53120"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sak6-57cj-v3e6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66284?format=api",
            "vulnerability_id": "VCID-sd5x-98z1-e7at",
            "summary": "kernel: drm/amd/display: fix mapping to non-allocated address",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53753.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53753.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53753"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419927",
                    "reference_id": "2419927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53753"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sd5x-98z1-e7at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69807?format=api",
            "vulnerability_id": "VCID-sg32-q283-3fhn",
            "summary": "kernel: net/mlx5: E-Switch, Fix an Oops in error handling code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53058.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53058.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15361",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15382",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15424",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15422",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15366",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15233",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29486",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29434",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29454",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29426",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29528",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29554",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29425",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29487",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53058"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363697",
                    "reference_id": "2363697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363697"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53058"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg32-q283-3fhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66993?format=api",
            "vulnerability_id": "VCID-sgmg-wyp2-yfdr",
            "summary": "kernel: blk-iolatency: Fix memory leak on add_disk() failures",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0211",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402244",
                    "reference_id": "2402244",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402244"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50550"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgmg-wyp2-yfdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67606?format=api",
            "vulnerability_id": "VCID-sh4h-fthz-aygx",
            "summary": "kernel: scsi: ses: Don't attach if enclosure has no components",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53431.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53431.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02807",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02798",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04047",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0388",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0389",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04011",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04021",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04028",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04073",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04032",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53431"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53431"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee",
                    "reference_id": "05143d90ac90b7abc6692285895a1ef460e008ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36",
                    "reference_id": "110d425cdfb15006f3c4fde5264e786a247b6b36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed",
                    "reference_id": "176d7345b89ced72020a313bfa4e7f345d1c3aed",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396534",
                    "reference_id": "2396534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396534"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5",
                    "reference_id": "4e7c498c3713b09bef20c76c7319555637e8bbd5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145",
                    "reference_id": "c8e22b7a1694bb8d025ea636816472739d859145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450",
                    "reference_id": "eabc4872f172ecb8dd8536bc366a51868154a450",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87",
                    "reference_id": "f8e702c54413eee2d8f94f61d18adadac7c87e87",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:15:06Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53431"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sh4h-fthz-aygx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78219?format=api",
            "vulnerability_id": "VCID-sha9-td26-mqc9",
            "summary": "kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4194.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4194.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00359",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00357",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00355",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00283",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00282",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0028",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00302",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00301",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00297",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00295",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229498",
                    "reference_id": "2229498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6343-1/",
                    "reference_id": "USN-6343-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6343-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6412-1/",
                    "reference_id": "USN-6412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-1/",
                    "reference_id": "USN-6416-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-2/",
                    "reference_id": "USN-6416-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6416-3/",
                    "reference_id": "USN-6416-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6416-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6417-1/",
                    "reference_id": "USN-6417-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6417-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-1/",
                    "reference_id": "USN-6445-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6445-2/",
                    "reference_id": "USN-6445-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6445-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6466-1/",
                    "reference_id": "USN-6466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6466-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4194"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sha9-td26-mqc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70724?format=api",
            "vulnerability_id": "VCID-sj54-tay9-t3f3",
            "summary": "kernel: usb: typec: ucsi: Don't attempt to resume the ports before they exist",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52938.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52938.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52938",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01672",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08233",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08367",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08332",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08391",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08356",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10552",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52938"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355518",
                    "reference_id": "2355518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355518"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f82060da749c611ed427523b6d1605d87338aac1",
                    "reference_id": "f82060da749c611ed427523b6d1605d87338aac1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f82060da749c611ed427523b6d1605d87338aac1"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fdd11d7136fd070b3a74d6d8799d9eac28a57fc5",
                    "reference_id": "fdd11d7136fd070b3a74d6d8799d9eac28a57fc5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fdd11d7136fd070b3a74d6d8799d9eac28a57fc5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52938"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj54-tay9-t3f3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67370?format=api",
            "vulnerability_id": "VCID-spy9-7v3j-5bbn",
            "summary": "kernel: clk: tegra: Fix refcount leak in tegra210_clock_init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50458"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400805",
                    "reference_id": "2400805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50458"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-spy9-7v3j-5bbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65288?format=api",
            "vulnerability_id": "VCID-srku-3ptu-nbgu",
            "summary": "kernel: ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54245.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54245.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54245",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54245"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426063",
                    "reference_id": "2426063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426063"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54245"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srku-3ptu-nbgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67899?format=api",
            "vulnerability_id": "VCID-st9x-42e5-wug7",
            "summary": "kernel: cpufreq: qcom: fix writes in read-only memory region",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50239.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50239.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03487",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04645",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04687",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04722",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04747",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04744",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04782",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04557",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04541",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50239"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50239"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395336",
                    "reference_id": "2395336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50239"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-st9x-42e5-wug7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65592?format=api",
            "vulnerability_id": "VCID-sw38-8vjt-bbdg",
            "summary": "kernel: Linux kernel: Denial of Service due to memory leak in rtl8xxxu Wi-Fi driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424977",
                    "reference_id": "2424977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54036"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sw38-8vjt-bbdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70671?format=api",
            "vulnerability_id": "VCID-swr7-u5sj-yffz",
            "summary": "kernel: RDMA/core: Fix ib block iterator counter overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53026.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53026.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01771",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02007",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05742",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05816",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05841",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05819",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0581",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05804",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05768",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05775",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05953",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05988",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05994",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05782",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05777",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53026"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0afec5e9cea732cb47014655685a2a47fb180c31",
                    "reference_id": "0afec5e9cea732cb47014655685a2a47fb180c31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0afec5e9cea732cb47014655685a2a47fb180c31"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355457",
                    "reference_id": "2355457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355457"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/362c9489720b31b6aa7491423ba65a4e98aa9838",
                    "reference_id": "362c9489720b31b6aa7491423ba65a4e98aa9838",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/362c9489720b31b6aa7491423ba65a4e98aa9838"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/43811d07ea64366af8ec9e168c558ec51440c39e",
                    "reference_id": "43811d07ea64366af8ec9e168c558ec51440c39e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/43811d07ea64366af8ec9e168c558ec51440c39e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/902063a9fea5f8252df392ade746bc9cfd07a5ae",
                    "reference_id": "902063a9fea5f8252df392ade746bc9cfd07a5ae",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/902063a9fea5f8252df392ade746bc9cfd07a5ae"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d66c1d4178c219b6e7d7a6f714e3e3656faccc36",
                    "reference_id": "d66c1d4178c219b6e7d7a6f714e3e3656faccc36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d66c1d4178c219b6e7d7a6f714e3e3656faccc36"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53026"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swr7-u5sj-yffz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65290?format=api",
            "vulnerability_id": "VCID-swu2-ef3y-cygu",
            "summary": "kernel: clk: tegra: Fix refcount leak in tegra114_clock_init",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15215",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50823"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426066",
                    "reference_id": "2426066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50823"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swu2-ef3y-cygu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65346?format=api",
            "vulnerability_id": "VCID-swwx-5jbc-n7da",
            "summary": "kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54300.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54300.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15215",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426122",
                    "reference_id": "2426122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54300"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swwx-5jbc-n7da"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67509?format=api",
            "vulnerability_id": "VCID-swxd-qvb2-tfat",
            "summary": "kernel: irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01513",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01416",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01518",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01526",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01525",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01533",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0152",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01494",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01498",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01502",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01487",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01486",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53383"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53383"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396396",
                    "reference_id": "2396396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396396"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e",
                    "reference_id": "35727af2b15d98a2dd2811d631d3a3886111312e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633",
                    "reference_id": "867a4f6cf1a8f511c06e131477988b3b3e7a0633",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0",
                    "reference_id": "86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069",
                    "reference_id": "RHSA-2023:5069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5069"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53383"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swxd-qvb2-tfat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69894?format=api",
            "vulnerability_id": "VCID-sx8u-athb-sbea",
            "summary": "kernel: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53112.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53112.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16114",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16132",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1617",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16018",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15899",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16012",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53112"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363788",
                    "reference_id": "2363788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53112"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sx8u-athb-sbea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67344?format=api",
            "vulnerability_id": "VCID-t1fp-4yag-afgu",
            "summary": "kernel: virtio_net: Fix error unwinding of XDP initialization",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53499.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53499.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53499"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400779",
                    "reference_id": "2400779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400779"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53499"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fp-4yag-afgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78980?format=api",
            "vulnerability_id": "VCID-t81u-wyws-r7c3",
            "summary": "kernel: Rate limit overflow messages in r8152 in intr_callback",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41795",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4204",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42104",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42127",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42089",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42064",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42115",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42018",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41958",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41952",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41869",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41728",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42075",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149024",
                    "reference_id": "2149024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149024"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2834",
                    "reference_id": "AVG-2834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2835",
                    "reference_id": "AVG-2835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2835"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2836",
                    "reference_id": "AVG-2836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2836"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2837",
                    "reference_id": "AVG-2837",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2837"
                },
                {
                    "reference_url": "https://vuldb.com/?id.211363",
                    "reference_id": "?id.211363",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"
                        }
                    ],
                    "url": "https://vuldb.com/?id.211363"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
                    "reference_id": "?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html",
                    "reference_id": "msg00031.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html",
                    "reference_id": "msg00034.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724",
                    "reference_id": "RHSA-2024:0724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404",
                    "reference_id": "RHSA-2024:1404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1404"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5754-1/",
                    "reference_id": "USN-5754-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5754-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5754-2/",
                    "reference_id": "USN-5754-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5754-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5755-1/",
                    "reference_id": "USN-5755-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5755-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5755-2/",
                    "reference_id": "USN-5755-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5755-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-1/",
                    "reference_id": "USN-5756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-2/",
                    "reference_id": "USN-5756-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5756-3/",
                    "reference_id": "USN-5756-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5756-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5757-1/",
                    "reference_id": "USN-5757-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5757-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5757-2/",
                    "reference_id": "USN-5757-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5757-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5758-1/",
                    "reference_id": "USN-5758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5773-1/",
                    "reference_id": "USN-5773-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5773-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5774-1/",
                    "reference_id": "USN-5774-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5774-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5779-1/",
                    "reference_id": "USN-5779-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5779-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5789-1/",
                    "reference_id": "USN-5789-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5789-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-3594"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67515?format=api",
            "vulnerability_id": "VCID-ta4g-cdfd-w7fv",
            "summary": "kernel: sctp: fix a potential overflow in sctp_ifwdtsn_skip",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04323",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53372"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396405",
                    "reference_id": "2396405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396405"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649",
                    "reference_id": "32832a2caf82663870126c5186cf8f86c8b2a649",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4",
                    "reference_id": "4fbd094d4131a10d06a45d64158567052a35b3f4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57",
                    "reference_id": "5c9367ac5a22d71841bcd00130f9146c9b227d57",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f",
                    "reference_id": "6109f5b13ce3e3e537db6f18976ec0e9118d1c6f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5",
                    "reference_id": "79b28f42214a3d0d6a8c514db3602260bd5d6cb5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7",
                    "reference_id": "ad831a7079c99c01e801764b53bc9997c2e9c0f7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73",
                    "reference_id": "ad988e9b5ff04607e624a459209e8c2d0c15fc73",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53372"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ta4g-cdfd-w7fv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65677?format=api",
            "vulnerability_id": "VCID-tdrv-18j7-t3h3",
            "summary": "kernel: wifi: mt76: do not run mt76u_status_worker if the device is not running",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50735.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50735.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50735"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425064",
                    "reference_id": "2425064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50735"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdrv-18j7-t3h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65731?format=api",
            "vulnerability_id": "VCID-tewn-u963-j3ar",
            "summary": "kernel: Linux kernel: Denial of Service in ath9k Wi-Fi driver due to URB memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50740.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50740.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425119",
                    "reference_id": "2425119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50740"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tewn-u963-j3ar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67287?format=api",
            "vulnerability_id": "VCID-thw5-hvm8-j7f4",
            "summary": "kernel: Linux kernel: Denial of Service via malicious MTU negotiation in TIPC",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53517.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53517.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400721",
                    "reference_id": "2400721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53517"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-thw5-hvm8-j7f4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4357?format=api",
            "vulnerability_id": "VCID-trxm-8mg3-4bbr",
            "summary": "x86/Intel: Gather Data Sampling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72829",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72799",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74964",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74883",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74916",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74952",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7493",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74921",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74957",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74993",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74999",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75003",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305",
                    "reference_id": "1043305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223949",
                    "reference_id": "2223949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223949"
                },
                {
                    "reference_url": "https://access.redhat.com/solutions/7027704",
                    "reference_id": "7027704",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/solutions/7027704"
                },
                {
                    "reference_url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/",
                    "reference_id": "AWS-2023-007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
                },
                {
                    "reference_url": "https://downfall.page",
                    "reference_id": "downfall.page",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://downfall.page"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5474",
                    "reference_id": "dsa-5474",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5474"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5475",
                    "reference_id": "dsa-5475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5475"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
                    "reference_id": "HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
                    "reference_id": "HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
                },
                {
                    "reference_url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
                    "reference_id": "intel-sa-00828.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html",
                    "reference_id": "msg00013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230811-0001/",
                    "reference_id": "ntap-20230811-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
                    "reference_id": "OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7423",
                    "reference_id": "RHSA-2023:7423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7424",
                    "reference_id": "RHSA-2023:7424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562",
                    "reference_id": "RHSA-2024:0562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0562"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563",
                    "reference_id": "RHSA-2024:0563",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0563"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250",
                    "reference_id": "RHSA-2024:1250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268",
                    "reference_id": "RHSA-2024:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269",
                    "reference_id": "RHSA-2024:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306",
                    "reference_id": "RHSA-2024:1306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3319",
                    "reference_id": "RHSA-2024:3319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3319"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/",
                    "reference_id": "T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6286-1/",
                    "reference_id": "USN-6286-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6286-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6315-1/",
                    "reference_id": "USN-6315-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6315-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6316-1/",
                    "reference_id": "USN-6316-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6316-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6317-1/",
                    "reference_id": "USN-6317-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6317-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6318-1/",
                    "reference_id": "USN-6318-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6318-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6321-1/",
                    "reference_id": "USN-6321-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6321-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6324-1/",
                    "reference_id": "USN-6324-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6324-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6325-1/",
                    "reference_id": "USN-6325-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6325-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6328-1/",
                    "reference_id": "USN-6328-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6328-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6329-1/",
                    "reference_id": "USN-6329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6330-1/",
                    "reference_id": "USN-6330-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6330-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6346-1/",
                    "reference_id": "USN-6346-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6346-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6348-1/",
                    "reference_id": "USN-6348-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6348-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6357-1/",
                    "reference_id": "USN-6357-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6357-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6388-1/",
                    "reference_id": "USN-6388-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6388-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-1/",
                    "reference_id": "USN-6396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-2/",
                    "reference_id": "USN-6396-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-3/",
                    "reference_id": "USN-6396-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6397-1/",
                    "reference_id": "USN-6397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6397-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-435.html",
                    "reference_id": "XSA-435",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"
                        }
                    ],
                    "url": "https://xenbits.xen.org/xsa/advisory-435.html"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-40982",
                "XSA-435"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67782?format=api",
            "vulnerability_id": "VCID-tte1-xd13-nfd6",
            "summary": "kernel: netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53333.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53333.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04323",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53333"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395885",
                    "reference_id": "2395885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395885"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/26bd1f210d3783a691052c51d76bb8a8bbd24c67",
                    "reference_id": "26bd1f210d3783a691052c51d76bb8a8bbd24c67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/26bd1f210d3783a691052c51d76bb8a8bbd24c67"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/337fdce450637ea663bc816edc2ba81e5cdad02e",
                    "reference_id": "337fdce450637ea663bc816edc2ba81e5cdad02e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/337fdce450637ea663bc816edc2ba81e5cdad02e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/5c618daa5038712c4a4ef8923905a2ea1b8836a1",
                    "reference_id": "5c618daa5038712c4a4ef8923905a2ea1b8836a1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/5c618daa5038712c4a4ef8923905a2ea1b8836a1"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8c0980493beed3a80d6329c44ab293dc8c032927",
                    "reference_id": "8c0980493beed3a80d6329c44ab293dc8c032927",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8c0980493beed3a80d6329c44ab293dc8c032927"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/9bdcda7abaf22f6453e5b5efb7eb4e524095d5d8",
                    "reference_id": "9bdcda7abaf22f6453e5b5efb7eb4e524095d5d8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/9bdcda7abaf22f6453e5b5efb7eb4e524095d5d8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c052797ac36813419ad3bfa54cb8615db4b41f15",
                    "reference_id": "c052797ac36813419ad3bfa54cb8615db4b41f15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c052797ac36813419ad3bfa54cb8615db4b41f15"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30",
                    "reference_id": "ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:30:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53333"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tte1-xd13-nfd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66800?format=api",
            "vulnerability_id": "VCID-tthu-26he-c3bw",
            "summary": "kernel: tpm: acpi: Call acpi_put_table() to fix memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50562.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50562.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08409",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08461",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08382",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08471",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08306",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08433",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08397",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08364",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08317",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08459",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50562"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50562"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405754",
                    "reference_id": "2405754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405754"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50562"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tthu-26he-c3bw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66949?format=api",
            "vulnerability_id": "VCID-tx4a-qjed-3bac",
            "summary": "kernel: drivers/perf: hisi: Don't migrate perf to the CPU going to teardown",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53656.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53656.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53656"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402196",
                    "reference_id": "2402196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53656"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tx4a-qjed-3bac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71525?format=api",
            "vulnerability_id": "VCID-tygq-ahh3-43db",
            "summary": "kernel: filemap: Handle sibling entries in filemap_get_read_batch()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22554",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25641",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25759",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25729",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25672",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25674",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25658",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25633",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25581",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25573",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25523",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25712",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348099",
                    "reference_id": "2348099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49699"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tygq-ahh3-43db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67537?format=api",
            "vulnerability_id": "VCID-u2wy-4dp3-nubj",
            "summary": "kernel: HID: intel-ish-hid: Fix kernel panic during warm reset",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53392.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53392.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01868",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02633",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02494",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02499",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02592",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02582",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02644",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02616",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53392"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396427",
                    "reference_id": "2396427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396427"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53392"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2wy-4dp3-nubj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67315?format=api",
            "vulnerability_id": "VCID-u3j5-uw7s-qkcx",
            "summary": "kernel: Linux kernel CXL driver: Use-after-free vulnerability leading to system instability or privilege escalation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01868",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01908",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01904",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0183",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02633",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02644",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53479"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400749",
                    "reference_id": "2400749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400749"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53479"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3j5-uw7s-qkcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66108?format=api",
            "vulnerability_id": "VCID-u713-myap-qbbc",
            "summary": "kernel: nvme-core: fix memory leak in dhchap_ctrl_secret",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53792.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53792.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06291",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53792"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420273",
                    "reference_id": "2420273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420273"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53792"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u713-myap-qbbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65678?format=api",
            "vulnerability_id": "VCID-u8nd-e8ar-xufr",
            "summary": "kernel: Linux kernel: Denial of Service in s390/lcs network driver due to incompatible function pointer type",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50728.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50728.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15121",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19499",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425065",
                    "reference_id": "2425065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50728"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8nd-e8ar-xufr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65666?format=api",
            "vulnerability_id": "VCID-u945-mmxc-vkat",
            "summary": "kernel: Linux kernel: Resource leak in regulator_register can cause system unavailability",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50724.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50724.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50724"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425053",
                    "reference_id": "2425053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50724"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u945-mmxc-vkat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67626?format=api",
            "vulnerability_id": "VCID-uahv-ngwf-2fg1",
            "summary": "kernel: drm/vkms: Fix null-ptr-deref in vkms_release()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50369.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50369.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03972",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0396",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0411",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04128",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50369"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0b8f390e2251191f1b179cc87f65d54c96565f0d",
                    "reference_id": "0b8f390e2251191f1b179cc87f65d54c96565f0d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0b8f390e2251191f1b179cc87f65d54c96565f0d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1f9836f95271e7acf016667eee0aeae3386f9645",
                    "reference_id": "1f9836f95271e7acf016667eee0aeae3386f9645",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1f9836f95271e7acf016667eee0aeae3386f9645"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396112",
                    "reference_id": "2396112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396112"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2fe2a8f40c21161ffe7653cc234e7934db5b7cc5",
                    "reference_id": "2fe2a8f40c21161ffe7653cc234e7934db5b7cc5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2fe2a8f40c21161ffe7653cc234e7934db5b7cc5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/57031c474c3a920ea73afeb5dc352e537f5793ee",
                    "reference_id": "57031c474c3a920ea73afeb5dc352e537f5793ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/57031c474c3a920ea73afeb5dc352e537f5793ee"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/596f1ba3987e601e31a5abf1f75ce1d2635aceac",
                    "reference_id": "596f1ba3987e601e31a5abf1f75ce1d2635aceac",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/596f1ba3987e601e31a5abf1f75ce1d2635aceac"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13960",
                    "reference_id": "RHSA-2025:13960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13960"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13961",
                    "reference_id": "RHSA-2025:13961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13961"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15658",
                    "reference_id": "RHSA-2025:15658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15670",
                    "reference_id": "RHSA-2025:15670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15670"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50369"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uahv-ngwf-2fg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78236?format=api",
            "vulnerability_id": "VCID-ubr3-74hm-e7hy",
            "summary": "kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07459",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07309",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08587",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08541",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08535",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08414",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08574",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13118",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13198",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13402",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13279",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1333",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13298",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1326",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511",
                    "reference_id": "2225511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418",
                    "reference_id": "RHSA-2023:7418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7419",
                    "reference_id": "RHSA-2023:7419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7419"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7423",
                    "reference_id": "RHSA-2023:7423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7424",
                    "reference_id": "RHSA-2023:7424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7558",
                    "reference_id": "RHSA-2023:7558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0261",
                    "reference_id": "RHSA-2024:0261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0262",
                    "reference_id": "RHSA-2024:0262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0262"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4207"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubr3-74hm-e7hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66116?format=api",
            "vulnerability_id": "VCID-udw2-zd4k-jbf8",
            "summary": "kernel: drm/amdkfd: fix potential kgd_mem UAFs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53816.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53816"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53816"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420281",
                    "reference_id": "2420281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53816"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-udw2-zd4k-jbf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70040?format=api",
            "vulnerability_id": "VCID-ued9-gub9-hyfg",
            "summary": "kernel: drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49827.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49827.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16212",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16273",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16068",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16041",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15976",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15972",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15931",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15813",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15924",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49827"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49827"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363409",
                    "reference_id": "2363409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363409"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49827"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ued9-gub9-hyfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69793?format=api",
            "vulnerability_id": "VCID-ufc1-327r-h3es",
            "summary": "kernel: wifi: nl80211: fix NULL-ptr deref in offchan check",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53113.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53113.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53113"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363683",
                    "reference_id": "2363683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53113"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ufc1-327r-h3es"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78758?format=api",
            "vulnerability_id": "VCID-uhue-acky-4ye7",
            "summary": "kernel: HID: check empty report_list in hid_validate_values()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04954",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0499",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05009",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05027",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05031",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04976",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04998",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06226",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05886",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05897",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06048",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0607",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.061",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06106",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06126",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/11/05/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/11/05/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173403",
                    "reference_id": "2173403",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173403"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/osssecurity/2023/01/17/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/osssecurity/2023/01/17/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/11/05/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/11/05/3"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456",
                    "reference_id": "id=b12fece4c64857e5fab4290bf01b2e0317a88456",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412",
                    "reference_id": "RHSA-2024:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575",
                    "reference_id": "RHSA-2024:0575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881",
                    "reference_id": "RHSA-2024:0881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0881"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897",
                    "reference_id": "RHSA-2024:0897",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0897"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5978-1/",
                    "reference_id": "USN-5978-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5978-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6025-1/",
                    "reference_id": "USN-6025-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6025-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6027-1/",
                    "reference_id": "USN-6027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6027-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6029-1/",
                    "reference_id": "USN-6029-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6029-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6030-1/",
                    "reference_id": "USN-6030-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6030-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6040-1/",
                    "reference_id": "USN-6040-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6040-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6057-1/",
                    "reference_id": "USN-6057-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6057-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6079-1/",
                    "reference_id": "USN-6079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6091-1/",
                    "reference_id": "USN-6091-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6091-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6093-1/",
                    "reference_id": "USN-6093-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6093-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6096-1/",
                    "reference_id": "USN-6096-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6096-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6149-1/",
                    "reference_id": "USN-6149-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6149-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6174-1/",
                    "reference_id": "USN-6174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6174-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6235-1/",
                    "reference_id": "USN-6235-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6235-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1073"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhue-acky-4ye7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67129?format=api",
            "vulnerability_id": "VCID-ujcw-npmr-1uae",
            "summary": "kernel: netfilter: ipset: Rework long task execution when adding/deleting entries",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53549.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53549.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01519",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01527",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0153",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01521",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01607",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01627",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01499",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01515",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01603",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02313",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02317",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53549"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401491",
                    "reference_id": "2401491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53549"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcw-npmr-1uae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65268?format=api",
            "vulnerability_id": "VCID-ukjx-3zz6-53ek",
            "summary": "kernel: bpf: prevent decl_tag from being referenced in func_proto",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50862.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50862.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50862"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426043",
                    "reference_id": "2426043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50862"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukjx-3zz6-53ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70678?format=api",
            "vulnerability_id": "VCID-uneq-436k-jyb3",
            "summary": "kernel: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52997.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52997.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04915",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24729",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355468",
                    "reference_id": "2355468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355468"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52997"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uneq-436k-jyb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65584?format=api",
            "vulnerability_id": "VCID-uqyg-b1t9-guf3",
            "summary": "kernel: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424969",
                    "reference_id": "2424969",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424969"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50699"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqyg-b1t9-guf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70669?format=api",
            "vulnerability_id": "VCID-urmf-rw6a-kudw",
            "summary": "kernel: drm/i915: Avoid potential vm use-after-free",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52931.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52931.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08824",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08909",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08865",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08757",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08732",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08883",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.089",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08853",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0886",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08874",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08884",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08911",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08877",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15842",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22601",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52931"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355455",
                    "reference_id": "2355455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355455"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d",
                    "reference_id": "41d419382ec7e257e54b7b6ff0d3623aafb1316d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:22:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00",
                    "reference_id": "764accc2c1b8fd1507be2e7f436c94cdce887a00",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:22:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52931"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-urmf-rw6a-kudw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65425?format=api",
            "vulnerability_id": "VCID-us8q-fx2p-wugu",
            "summary": "kernel: wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50881.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50881.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426203",
                    "reference_id": "2426203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50881"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-us8q-fx2p-wugu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69321?format=api",
            "vulnerability_id": "VCID-utmv-9mmg-97bz",
            "summary": "kernel: selinux: Add boundary check in put_entry()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50200.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50200.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06385",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06428",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06466",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06488",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19761",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19811",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19806",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19776",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19685",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50200"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373605",
                    "reference_id": "2373605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373605"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13633",
                    "reference_id": "RHSA-2025:13633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13633"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13781",
                    "reference_id": "RHSA-2025:13781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14054",
                    "reference_id": "RHSA-2025:14054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14094",
                    "reference_id": "RHSA-2025:14094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14094"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50200"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utmv-9mmg-97bz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70718?format=api",
            "vulnerability_id": "VCID-uvrw-52kq-43hr",
            "summary": "kernel: HV: hv_balloon: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52937.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52937.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10297",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10371",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10242",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10213",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10346",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10327",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10318",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10262",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10363",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10264",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10338",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10404",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10393",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11351",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11486",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52937"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0b570a059cf42ad6e2eb632f47c23813d58d8303",
                    "reference_id": "0b570a059cf42ad6e2eb632f47c23813d58d8303",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:25:04Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0b570a059cf42ad6e2eb632f47c23813d58d8303"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355512",
                    "reference_id": "2355512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355512"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6dfb0771429a63db8561d44147f2bb76f93e1c86",
                    "reference_id": "6dfb0771429a63db8561d44147f2bb76f93e1c86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:25:04Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6dfb0771429a63db8561d44147f2bb76f93e1c86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52937"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvrw-52kq-43hr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70661?format=api",
            "vulnerability_id": "VCID-uwqz-xtub-4qes",
            "summary": "kernel: drm/i915: Fix a memory leak with reused mmap_offset",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08391",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08356",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08233",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08367",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08332",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10687",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19864",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53002"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0220e4fe178c3390eb0291cdb34912d66972db8a",
                    "reference_id": "0220e4fe178c3390eb0291cdb34912d66972db8a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:10Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0220e4fe178c3390eb0291cdb34912d66972db8a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb",
                    "reference_id": "0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:10Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355447",
                    "reference_id": "2355447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53002"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uwqz-xtub-4qes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66798?format=api",
            "vulnerability_id": "VCID-uy57-56un-h7hp",
            "summary": "kernel: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53710.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53710.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06382",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06419",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06462",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06439",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0638",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06538",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06569",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06574",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06595",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06724",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53710"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405752",
                    "reference_id": "2405752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53710"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uy57-56un-h7hp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69876?format=api",
            "vulnerability_id": "VCID-v3kc-8f22-gfff",
            "summary": "kernel: net/iucv: Fix size of interrupt data",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15758",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15825",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15628",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15741",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15706",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15641",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15574",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15634",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1568",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15677",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15618",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15489",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1561",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363769",
                    "reference_id": "2363769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53108"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3kc-8f22-gfff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65441?format=api",
            "vulnerability_id": "VCID-v3v2-h1eu-hfdt",
            "summary": "kernel: tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50824.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50824.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426221",
                    "reference_id": "2426221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50824"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3v2-h1eu-hfdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65287?format=api",
            "vulnerability_id": "VCID-v51d-wn8m-uqch",
            "summary": "kernel: iommufd: Check for uptr overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54239.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54239.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54239"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426062",
                    "reference_id": "2426062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54239"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v51d-wn8m-uqch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69836?format=api",
            "vulnerability_id": "VCID-v7gh-5ztd-wufc",
            "summary": "kernel: bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2003",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20168",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19838",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19916",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53103"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363728",
                    "reference_id": "2363728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363728"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53103"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v7gh-5ztd-wufc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67041?format=api",
            "vulnerability_id": "VCID-vbk3-2zss-xqbw",
            "summary": "kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53675.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53675.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53675"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402293",
                    "reference_id": "2402293",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402293"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0532",
                    "reference_id": "RHSA-2026:0532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0533",
                    "reference_id": "RHSA-2026:0533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0534",
                    "reference_id": "RHSA-2026:0534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0534"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0535",
                    "reference_id": "RHSA-2026:0535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0535"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0536",
                    "reference_id": "RHSA-2026:0536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0536"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0537",
                    "reference_id": "RHSA-2026:0537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0576",
                    "reference_id": "RHSA-2026:0576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0643",
                    "reference_id": "RHSA-2026:0643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0754",
                    "reference_id": "RHSA-2026:0754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0754"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0755",
                    "reference_id": "RHSA-2026:0755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0755"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53675"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbk3-2zss-xqbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66162?format=api",
            "vulnerability_id": "VCID-vc5c-fmue-3fc6",
            "summary": "kernel: ASoC: soc-compress: Reposition and add pcm_mutex",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53866.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53866.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05921",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53866"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420336",
                    "reference_id": "2420336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53866"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc5c-fmue-3fc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67371?format=api",
            "vulnerability_id": "VCID-vcqz-n7gh-8ubz",
            "summary": "kernel: scsi: mpt3sas: Fix a memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53512.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53512.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53512"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400806",
                    "reference_id": "2400806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400806"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53512"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcqz-n7gh-8ubz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66997?format=api",
            "vulnerability_id": "VCID-vczs-dhkw-jbed",
            "summary": "kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53639.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53639.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53639"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53639"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402248",
                    "reference_id": "2402248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402248"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53639"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vczs-dhkw-jbed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66168?format=api",
            "vulnerability_id": "VCID-vczs-zdyv-bkaa",
            "summary": "kernel: drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50667.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50667.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10037",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09858",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50667"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420343",
                    "reference_id": "2420343",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420343"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50667"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vczs-zdyv-bkaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67322?format=api",
            "vulnerability_id": "VCID-vdnm-hzq9-rfh8",
            "summary": "kernel: wifi: ath11k: fix deinitialization of firmware resources",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04437",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53532"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400756",
                    "reference_id": "2400756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53532"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vdnm-hzq9-rfh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67993?format=api",
            "vulnerability_id": "VCID-ve64-7aw3-gych",
            "summary": "kernel: drm/bridge: megachips: Fix a null pointer dereference bug",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50317.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50317.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02965",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04226",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04203",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0423",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50317"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395436",
                    "reference_id": "2395436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50317"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ve64-7aw3-gych"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70658?format=api",
            "vulnerability_id": "VCID-vegv-pn5p-7uav",
            "summary": "kernel: drm/i915: Fix request ref counting during error capture & debugfs dump",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52981.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52981.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25401",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36761",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355444",
                    "reference_id": "2355444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52981"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vegv-pn5p-7uav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67990?format=api",
            "vulnerability_id": "VCID-vf5a-cj4m-auc4",
            "summary": "kernel: Linux kernel: Denial of Service due to function prototype mismatch",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50322.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50322.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02261",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02295",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02186",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50322"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395433",
                    "reference_id": "2395433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395433"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50322"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vf5a-cj4m-auc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69845?format=api",
            "vulnerability_id": "VCID-vfen-6dad-3kbm",
            "summary": "kernel: scsi: mpi3mr: Fix mpi3mr_hba_port memory leak in mpi3mr_remove()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53132.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53132.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53132"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363737",
                    "reference_id": "2363737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53132"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vfen-6dad-3kbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67018?format=api",
            "vulnerability_id": "VCID-vgd5-jh9f-6ygx",
            "summary": "kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50544.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50544.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50544"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402269",
                    "reference_id": "2402269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50544"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgd5-jh9f-6ygx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67324?format=api",
            "vulnerability_id": "VCID-vpjc-naan-kuar",
            "summary": "kernel: netfilter: nf_tables: do not ignore genmask when looking up chain by id",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03017",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03001",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03122",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03119",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02993",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04332",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04317",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53492"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400758",
                    "reference_id": "2400758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400758"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604",
                    "reference_id": "RHSA-2023:5604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53492"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpjc-naan-kuar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66106?format=api",
            "vulnerability_id": "VCID-vptv-dkfb-wfdg",
            "summary": "kernel: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50645.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50645.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08811",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14384",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14454",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50645"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50645"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420271",
                    "reference_id": "2420271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50645"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vptv-dkfb-wfdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65414?format=api",
            "vulnerability_id": "VCID-vpzc-cd7z-93eb",
            "summary": "kernel: vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54174.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54174.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54174"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426192",
                    "reference_id": "2426192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54174"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpzc-cd7z-93eb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67014?format=api",
            "vulnerability_id": "VCID-vqmj-h83k-v3gm",
            "summary": "kernel: nvme-core: fix dev_pm_qos memleak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05079",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0513",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05163",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0518",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05151",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05134",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.053",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05067",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05072",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05224",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06241",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06353",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53670"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402265",
                    "reference_id": "2402265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402265"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53670"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqmj-h83k-v3gm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66939?format=api",
            "vulnerability_id": "VCID-vu6p-7swr-mqe6",
            "summary": "kernel: nvme-tcp: don't access released socket during error recovery",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53643.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53643.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0188",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01876",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01806",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01887",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02262",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02266",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53643"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402186",
                    "reference_id": "2402186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53643"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu6p-7swr-mqe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65446?format=api",
            "vulnerability_id": "VCID-vwpb-78dc-wuf7",
            "summary": "kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226",
                    "reference_id": "2426226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661",
                    "reference_id": "RHSA-2026:1661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662",
                    "reference_id": "RHSA-2026:1662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909",
                    "reference_id": "RHSA-2026:1909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1909"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946",
                    "reference_id": "RHSA-2026:1946",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1946"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490",
                    "reference_id": "RHSA-2026:2490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573",
                    "reference_id": "RHSA-2026:2573",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2573"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577",
                    "reference_id": "RHSA-2026:2577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2577"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277",
                    "reference_id": "RHSA-2026:3277",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:3277"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360",
                    "reference_id": "RHSA-2026:3360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:3360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388",
                    "reference_id": "RHSA-2026:3388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:3388"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50865"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65435?format=api",
            "vulnerability_id": "VCID-w44r-ae3c-hyc6",
            "summary": "kernel: usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06942",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06914",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09347",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50825"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426214",
                    "reference_id": "2426214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426214"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50825"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w44r-ae3c-hyc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69867?format=api",
            "vulnerability_id": "VCID-w5zx-eed4-efdw",
            "summary": "kernel: drm/amdkfd: Fix an illegal memory access",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53090.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53090.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12571",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12501",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12553",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12443",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12346",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1235",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12469",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12437",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12326",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12237",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12375",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363760",
                    "reference_id": "2363760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363760"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53090"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5zx-eed4-efdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70645?format=api",
            "vulnerability_id": "VCID-wcwy-sw27-dyf4",
            "summary": "kernel: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52988.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52988.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07021",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07099",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07139",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07133",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07036",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07053",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07126",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07138",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07106",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07077",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07052",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11101",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17196",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52988"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52988"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1b9256c96220bcdba287eeeb90e7c910c77f8c46",
                    "reference_id": "1b9256c96220bcdba287eeeb90e7c910c77f8c46",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1b9256c96220bcdba287eeeb90e7c910c77f8c46"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355431",
                    "reference_id": "2355431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355431"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2b557fa635e7487f638c0f030c305870839eeda2",
                    "reference_id": "2b557fa635e7487f638c0f030c305870839eeda2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2b557fa635e7487f638c0f030c305870839eeda2"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/437e50ef6290ac835d526d0e45f466a0aa69ba1b",
                    "reference_id": "437e50ef6290ac835d526d0e45f466a0aa69ba1b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/437e50ef6290ac835d526d0e45f466a0aa69ba1b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6e1f586ddec48d71016b81acf68ba9f49ca54db8",
                    "reference_id": "6e1f586ddec48d71016b81acf68ba9f49ca54db8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6e1f586ddec48d71016b81acf68ba9f49ca54db8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/b9cee506da2b7920b5ea02ccd8e78a907d0ee7aa",
                    "reference_id": "b9cee506da2b7920b5ea02ccd8e78a907d0ee7aa",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/b9cee506da2b7920b5ea02ccd8e78a907d0ee7aa"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d6870f3800dbb212ae8433183ee82f566d067c6c",
                    "reference_id": "d6870f3800dbb212ae8433183ee82f566d067c6c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d6870f3800dbb212ae8433183ee82f566d067c6c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f011360ad234a07cb6fbcc720fff646a93a9f0d6",
                    "reference_id": "f011360ad234a07cb6fbcc720fff646a93a9f0d6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T17:20:44Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f011360ad234a07cb6fbcc720fff646a93a9f0d6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-52988"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcwy-sw27-dyf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65574?format=api",
            "vulnerability_id": "VCID-wedr-ny2f-1ygy",
            "summary": "kernel: Linux kernel: Denial of Service in ice driver via ethtool reload",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54037.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54037.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54037"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424959",
                    "reference_id": "2424959",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424959"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54037"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wedr-ny2f-1ygy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66774?format=api",
            "vulnerability_id": "VCID-wf5j-rr3s-a3dz",
            "summary": "kernel: Linux kernel: Network subsystem memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12177",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12163",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12033",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12035",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1215",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12126",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12092",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11992",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11905",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1204",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53716"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405728",
                    "reference_id": "2405728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405728"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53716"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wf5j-rr3s-a3dz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71718?format=api",
            "vulnerability_id": "VCID-whnw-s91p-4ybg",
            "summary": "kernel: rtc: pl031: fix rtc features null pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10785",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28998",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29432",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29452",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29379",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29262",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2915",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29083",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28936",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29525",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/1b915703964f7e636961df04c540261dc55c6c70",
                    "reference_id": "1b915703964f7e636961df04c540261dc55c6c70",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:45:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/1b915703964f7e636961df04c540261dc55c6c70"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348294",
                    "reference_id": "2348294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348294"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/cd2722e411e8ab7e5ae41102f6925fa13dffdac5",
                    "reference_id": "cd2722e411e8ab7e5ae41102f6925fa13dffdac5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:45:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/cd2722e411e8ab7e5ae41102f6925fa13dffdac5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d274ce4a3dfd0b9a292667535578359b865765cb",
                    "reference_id": "d274ce4a3dfd0b9a292667535578359b865765cb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:45:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d274ce4a3dfd0b9a292667535578359b865765cb"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ea6af39f3da50c86367a71eb3cc674ade3ed244c",
                    "reference_id": "ea6af39f3da50c86367a71eb3cc674ade3ed244c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:45:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ea6af39f3da50c86367a71eb3cc674ade3ed244c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49273"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whnw-s91p-4ybg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65444?format=api",
            "vulnerability_id": "VCID-wnep-c9wf-hycp",
            "summary": "kernel: Linux kernel: Memory leak in RDMA restrack leads to Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50822.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50822.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426224",
                    "reference_id": "2426224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426224"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50822"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnep-c9wf-hycp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66223?format=api",
            "vulnerability_id": "VCID-wpwa-mc4t-3kcw",
            "summary": "kernel: dmaengine: ptdma: check for null desc before calling pt_cmd_callback",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53755.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53755.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53755"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419836",
                    "reference_id": "2419836",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419836"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53755"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpwa-mc4t-3kcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65461?format=api",
            "vulnerability_id": "VCID-wrtt-y22r-hffw",
            "summary": "kernel: net/mlx5e: TC, Fix using eswitch mapping in nic mode",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54216.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54216.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07737",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07708",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10503",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54216"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426241",
                    "reference_id": "2426241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54216"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrtt-y22r-hffw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65420?format=api",
            "vulnerability_id": "VCID-wt54-7n7s-zudn",
            "summary": "kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54309.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54309.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10793",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54309"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426198",
                    "reference_id": "2426198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54309"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wt54-7n7s-zudn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67857?format=api",
            "vulnerability_id": "VCID-wtjz-8ahr-xbhh",
            "summary": "kernel: power: supply: fix null pointer dereferencing in power_supply_get_battery_info",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50276.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50276.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05322",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05261",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05286",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06194",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06208",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0624",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06248",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06266",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06378",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06085",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06079",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06071",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06036",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06045",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50276"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50276"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395292",
                    "reference_id": "2395292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50276"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wtjz-8ahr-xbhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65783?format=api",
            "vulnerability_id": "VCID-wxpd-tjfm-ckej",
            "summary": "kernel: drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50750.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50750.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425171",
                    "reference_id": "2425171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50750"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxpd-tjfm-ckej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69858?format=api",
            "vulnerability_id": "VCID-wybf-bh7h-yycw",
            "summary": "kernel: thunderbolt: Fix memory leak in margining",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53050.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53050.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53050"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363751",
                    "reference_id": "2363751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363751"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53050"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wybf-bh7h-yycw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78505?format=api",
            "vulnerability_id": "VCID-wzfs-19ss-5fav",
            "summary": "kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06039",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05924",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05933",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05948",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06045",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06066",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06457",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06451",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06392",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06373",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06464",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06352",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06384",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189388",
                    "reference_id": "2189388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189388"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6173-1/",
                    "reference_id": "USN-6173-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6173-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6283-1/",
                    "reference_id": "USN-6283-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6283-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6300-1/",
                    "reference_id": "USN-6300-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6300-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6309-1/",
                    "reference_id": "USN-6309-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6309-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6311-1/",
                    "reference_id": "USN-6311-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6311-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6327-1/",
                    "reference_id": "USN-6327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6332-1/",
                    "reference_id": "USN-6332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6340-1/",
                    "reference_id": "USN-6340-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6340-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6340-2/",
                    "reference_id": "USN-6340-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6340-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6342-1/",
                    "reference_id": "USN-6342-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6342-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6342-2/",
                    "reference_id": "USN-6342-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6342-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6347-1/",
                    "reference_id": "USN-6347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6347-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6349-1/",
                    "reference_id": "USN-6349-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6349-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6357-1/",
                    "reference_id": "USN-6357-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6357-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6397-1/",
                    "reference_id": "USN-6397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-2269"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wzfs-19ss-5fav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66083?format=api",
            "vulnerability_id": "VCID-x2r4-aqk2-u3c7",
            "summary": "kernel: Linux kernel: Local denial of service in marvell_cn10k perf driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50632.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50632.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05639",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09303",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09144",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0919",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50632"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420245",
                    "reference_id": "2420245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50632"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x2r4-aqk2-u3c7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67261?format=api",
            "vulnerability_id": "VCID-x5kn-javc-rqbf",
            "summary": "kernel: Linux kernel: Denial of Service in io_uring due to hung task detection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53461.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53461.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53461",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02895",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02879",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02992",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53461"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53461",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53461"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400692",
                    "reference_id": "2400692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400692"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53461"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5kn-javc-rqbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65246?format=api",
            "vulnerability_id": "VCID-x88m-6k5m-1qcz",
            "summary": "kernel: Linux kernel: Denial of service in lontium-lt9611 GPU driver due to NULL pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07569",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426019",
                    "reference_id": "2426019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50878"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x88m-6k5m-1qcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66760?format=api",
            "vulnerability_id": "VCID-x8jd-vket-qkec",
            "summary": "kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12177",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12163",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12033",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12035",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1215",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12126",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12092",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11992",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11905",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1204",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405713",
                    "reference_id": "2405713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405713"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0532",
                    "reference_id": "RHSA-2026:0532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0533",
                    "reference_id": "RHSA-2026:0533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0537",
                    "reference_id": "RHSA-2026:0537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0576",
                    "reference_id": "RHSA-2026:0576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0754",
                    "reference_id": "RHSA-2026:0754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0754"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0755",
                    "reference_id": "RHSA-2026:0755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1441",
                    "reference_id": "RHSA-2026:1441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1441"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1442",
                    "reference_id": "RHSA-2026:1442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1442"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1443",
                    "reference_id": "RHSA-2026:1443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1512",
                    "reference_id": "RHSA-2026:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1512"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53705"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8jd-vket-qkec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67345?format=api",
            "vulnerability_id": "VCID-xbcy-wz8a-77ba",
            "summary": "kernel: Linux kernel: Information disclosure and denial of service via use-after-free in ACPI subsystem",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50423.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50423.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02775",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02786",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02681",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02673",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02694",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02742",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02722",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02719",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03862",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03889",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03846",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50423"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/01f2c2052ea50fb9a8ce12e4e83aed0267934ef0",
                    "reference_id": "01f2c2052ea50fb9a8ce12e4e83aed0267934ef0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/01f2c2052ea50fb9a8ce12e4e83aed0267934ef0"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/02617006b5a46f2ea55ac61f5693c7afd7bf9276",
                    "reference_id": "02617006b5a46f2ea55ac61f5693c7afd7bf9276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/02617006b5a46f2ea55ac61f5693c7afd7bf9276"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/02f237423c9c6a18e062de2d474f85d5659e4eb9",
                    "reference_id": "02f237423c9c6a18e062de2d474f85d5659e4eb9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/02f237423c9c6a18e062de2d474f85d5659e4eb9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/133462d35dae95edb944af86b986d4c9dec59bd1",
                    "reference_id": "133462d35dae95edb944af86b986d4c9dec59bd1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/133462d35dae95edb944af86b986d4c9dec59bd1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400780",
                    "reference_id": "2400780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400780"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/470188b09e92d83c5a997f25f0e8fb8cd2bc3469",
                    "reference_id": "470188b09e92d83c5a997f25f0e8fb8cd2bc3469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/470188b09e92d83c5a997f25f0e8fb8cd2bc3469"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6fde666278f91b85d71545a0ebbf41d8d7af8074",
                    "reference_id": "6fde666278f91b85d71545a0ebbf41d8d7af8074",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6fde666278f91b85d71545a0ebbf41d8d7af8074"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c9125b643fc51b8e662f2f614096ceb45a0adbc3",
                    "reference_id": "c9125b643fc51b8e662f2f614096ceb45a0adbc3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c9125b643fc51b8e662f2f614096ceb45a0adbc3"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/dfdde4d5138bc023897033a5ac653a84e94805be",
                    "reference_id": "dfdde4d5138bc023897033a5ac653a84e94805be",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/dfdde4d5138bc023897033a5ac653a84e94805be"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6",
                    "reference_id": "f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50423"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbcy-wz8a-77ba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70074?format=api",
            "vulnerability_id": "VCID-xcjv-m3zd-4bhd",
            "summary": "kernel: bpf, verifier: Fix memory leak in array reallocation for stack state",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49878"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/06615967d4889b08b19ff3dda96e8b131282f73d",
                    "reference_id": "06615967d4889b08b19ff3dda96e8b131282f73d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:02:47Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/06615967d4889b08b19ff3dda96e8b131282f73d"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363443",
                    "reference_id": "2363443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363443"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/3e210891c4a4c2d858cd6f9f61d5809af251d4df",
                    "reference_id": "3e210891c4a4c2d858cd6f9f61d5809af251d4df",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:02:47Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/3e210891c4a4c2d858cd6f9f61d5809af251d4df"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/42378a9ca55347102bbf86708776061d8fe3ece2",
                    "reference_id": "42378a9ca55347102bbf86708776061d8fe3ece2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:02:47Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/42378a9ca55347102bbf86708776061d8fe3ece2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49878"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xcjv-m3zd-4bhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65624?format=api",
            "vulnerability_id": "VCID-xen2-vhq4-r7af",
            "summary": "kernel: Linux kernel: Denial of Service in iwlwifi due to NULL pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425011",
                    "reference_id": "2425011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54053"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xen2-vhq4-r7af"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69847?format=api",
            "vulnerability_id": "VCID-xkks-7p1q-2fbg",
            "summary": "kernel: drm/amdgpu: Fix call trace warning and hang when removing amdgpu device",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15058",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15104",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15099",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53036"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363739",
                    "reference_id": "2363739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363739"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53036"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xkks-7p1q-2fbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66955?format=api",
            "vulnerability_id": "VCID-xpyd-juuc-5kf6",
            "summary": "kernel: drm/i915: Fix memory leaks in i915 selftests",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0477",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04951",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04957",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04731",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04875",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53677"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402203",
                    "reference_id": "2402203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53677"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpyd-juuc-5kf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66984?format=api",
            "vulnerability_id": "VCID-xtez-b58n-yydw",
            "summary": "kernel: drm/i915/perf: add sentinel to xehp_oa_b_counters",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53646.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53646.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04797",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04846",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04844",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04801",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04941",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04981",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04753",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04762",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05881",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402234",
                    "reference_id": "2402234",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402234"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394",
                    "reference_id": "RHSA-2024:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2394"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53646"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xtez-b58n-yydw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65338?format=api",
            "vulnerability_id": "VCID-xw51-xeu8-97df",
            "summary": "kernel: ALSA: ymfpci: Create card with device-managed snd_devm_card_new()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54308.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54308.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54308"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426114",
                    "reference_id": "2426114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426114"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54308"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xw51-xeu8-97df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66242?format=api",
            "vulnerability_id": "VCID-xwcc-n1w3-hub8",
            "summary": "kernel: KVM: VMX: Fix crash due to uninitialized current_vmcs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53756.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53756.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06165",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10305",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10119",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10098",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10211",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10199",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10146",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10091",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53756"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419865",
                    "reference_id": "2419865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419865"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3465",
                    "reference_id": "RHSA-2023:3465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3465"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53756"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwcc-n1w3-hub8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69890?format=api",
            "vulnerability_id": "VCID-xyzh-7qzz-zfeb",
            "summary": "kernel: drm/shmem-helper: Remove another errant put in error path",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53084.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53084.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19794",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19928",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19937",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19835",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19812",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19816",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19827",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19716",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19577",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19662",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363784",
                    "reference_id": "2363784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363784"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53084"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyzh-7qzz-zfeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65576?format=api",
            "vulnerability_id": "VCID-y382-6d8s-cber",
            "summary": "kernel: Linux kernel KVM: Memory leak via coalesced MMIO unregistration failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54024"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424961",
                    "reference_id": "2424961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424961"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54024"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y382-6d8s-cber"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67768?format=api",
            "vulnerability_id": "VCID-y3e1-d9y7-cycm",
            "summary": "kernel: KVM: arm64: Handle kvm_arm_init failure correctly in finalize_pkvm",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53319.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53319.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04779",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05469",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05471",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05517",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05288",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05235",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05236",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53319"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395869",
                    "reference_id": "2395869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395869"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/91450dec0445f4d12f960ba68d8d05c3cb2ab5b8",
                    "reference_id": "91450dec0445f4d12f960ba68d8d05c3cb2ab5b8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:26:55Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/91450dec0445f4d12f960ba68d8d05c3cb2ab5b8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fa729bc7c9c8c17a2481358c841ef8ca920485d3",
                    "reference_id": "fa729bc7c9c8c17a2481358c841ef8ca920485d3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:26:55Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fa729bc7c9c8c17a2481358c841ef8ca920485d3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53319"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3e1-d9y7-cycm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71573?format=api",
            "vulnerability_id": "VCID-y53e-9dqj-fqcs",
            "summary": "kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49653.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49653.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17305",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16941",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1709",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17132",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17038",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1702",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16964",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16827",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17354",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17133",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17225",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1726",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17212",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17152",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49653"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348147",
                    "reference_id": "2348147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348147"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8ad59b397f86a4d8014966fdc0552095a0c4fb2b",
                    "reference_id": "8ad59b397f86a4d8014966fdc0552095a0c4fb2b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8ad59b397f86a4d8014966fdc0552095a0c4fb2b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19",
                    "reference_id": "a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d2bf1a6480e8d44658a8ac3bdcec081238873212",
                    "reference_id": "d2bf1a6480e8d44658a8ac3bdcec081238873212",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d2bf1a6480e8d44658a8ac3bdcec081238873212"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951",
                    "reference_id": "RHSA-2023:2951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49653"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y53e-9dqj-fqcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65579?format=api",
            "vulnerability_id": "VCID-y5ww-vmwk-k3dr",
            "summary": "kernel: Linux kernel UDPLITE: Denial of Service via null pointer dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54004"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424964",
                    "reference_id": "2424964",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424964"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54004"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5ww-vmwk-k3dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65578?format=api",
            "vulnerability_id": "VCID-y62y-rgp5-e7am",
            "summary": "kernel: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54029.json"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424963",
                    "reference_id": "2424963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424963"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54029"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y62y-rgp5-e7am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67776?format=api",
            "vulnerability_id": "VCID-y95w-zxcq-xqes",
            "summary": "kernel: cifs: fix oops during encryption",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50341.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50341.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01091",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01074",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01063",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01026",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01025",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01029",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01086",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0109",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50341"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395879",
                    "reference_id": "2395879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395879"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9",
                    "reference_id": "a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/bf0543b93740916ee91956f9a63da6fc0d79daaa",
                    "reference_id": "bf0543b93740916ee91956f9a63da6fc0d79daaa",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/bf0543b93740916ee91956f9a63da6fc0d79daaa"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e8d16a54842d609fd4a3ed2d81d4333d6329aa94",
                    "reference_id": "e8d16a54842d609fd4a3ed2d81d4333d6329aa94",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e8d16a54842d609fd4a3ed2d81d4333d6329aa94"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/e8e2861cc3258dbe407d01ea8c59bb5a53132301",
                    "reference_id": "e8e2861cc3258dbe407d01ea8c59bb5a53132301",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/e8e2861cc3258dbe407d01ea8c59bb5a53132301"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/f7f291e14dde32a07b1f0aa06921d28f875a7b54",
                    "reference_id": "f7f291e14dde32a07b1f0aa06921d28f875a7b54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/f7f291e14dde32a07b1f0aa06921d28f875a7b54"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/fe6ea044c4f05706cb71040055b1c70c6c8275e0",
                    "reference_id": "fe6ea044c4f05706cb71040055b1c70c6c8275e0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/fe6ea044c4f05706cb71040055b1c70c6c8275e0"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10772",
                    "reference_id": "RHSA-2024:10772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8856",
                    "reference_id": "RHSA-2024:8856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8856"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22006",
                    "reference_id": "RHSA-2025:22006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22066",
                    "reference_id": "RHSA-2025:22066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22072",
                    "reference_id": "RHSA-2025:22072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22087",
                    "reference_id": "RHSA-2025:22087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22087"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22910",
                    "reference_id": "RHSA-2025:22910",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22910"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22914",
                    "reference_id": "RHSA-2025:22914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22914"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886",
                    "reference_id": "RHSA-2026:1886",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1886"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664",
                    "reference_id": "RHSA-2026:2664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2664"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50341"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y95w-zxcq-xqes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73478?format=api",
            "vulnerability_id": "VCID-ybpq-b26n-wqfd",
            "summary": "kernel: gpiolib: fix memory leak in gpiochip_setup_dev()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48975.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48975.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03577",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03548",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03554",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03601",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03558",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00946",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00929",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00927",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00941",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0095",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320704",
                    "reference_id": "2320704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320704"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/371363716398ed718e389bea8c5e9843a79dde4e",
                    "reference_id": "371363716398ed718e389bea8c5e9843a79dde4e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:18:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/371363716398ed718e389bea8c5e9843a79dde4e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6daaa84b621485fe28c401be18debf92ae8ef04a",
                    "reference_id": "6daaa84b621485fe28c401be18debf92ae8ef04a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:18:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6daaa84b621485fe28c401be18debf92ae8ef04a"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ec851b23084b3a0af8bf0f5e51d33a8d678bdc49",
                    "reference_id": "ec851b23084b3a0af8bf0f5e51d33a8d678bdc49",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:18:35Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ec851b23084b3a0af8bf0f5e51d33a8d678bdc49"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48975"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybpq-b26n-wqfd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69886?format=api",
            "vulnerability_id": "VCID-ydjn-vawk-2qh4",
            "summary": "kernel: erspan: do not use skb_mac_header() in ndo_start_xmit()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15759",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15815",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15811",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1564",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25642",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25601",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25544",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25548",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25533",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25701",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25742",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25511",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25584",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53053"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363780",
                    "reference_id": "2363780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363780"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53053"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydjn-vawk-2qh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69889?format=api",
            "vulnerability_id": "VCID-ykm2-x9w9-k3ck",
            "summary": "kernel: ext4: Fix deadlock during directory rename",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53129.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363783",
                    "reference_id": "2363783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363783"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53129"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ykm2-x9w9-k3ck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65263?format=api",
            "vulnerability_id": "VCID-ympn-kba7-uubp",
            "summary": "kernel: net/mlx5e: Don't clone flow post action attributes second time",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54262.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54262.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07437",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07417",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07381",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07456",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09895",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10048",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54262"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426037",
                    "reference_id": "2426037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54262"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ympn-kba7-uubp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67543?format=api",
            "vulnerability_id": "VCID-yrka-zpny-hbd1",
            "summary": "kernel: Linux kernel: Denial of Service and information disclosure via undefined bit shift in drm/ttm",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50390.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50390.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0385",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03855",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0388",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03843",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03797",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04889",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05045",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04899",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05076",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05157",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05118",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05119",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05108",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50390"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50390"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396433",
                    "reference_id": "2396433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396433"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/2ff0309b73d86e8591881ac035af06e01c112e89",
                    "reference_id": "2ff0309b73d86e8591881ac035af06e01c112e89",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/2ff0309b73d86e8591881ac035af06e01c112e89"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/387659939c00156f8d6bab0fbc55b4eaf2b6bc5b",
                    "reference_id": "387659939c00156f8d6bab0fbc55b4eaf2b6bc5b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/387659939c00156f8d6bab0fbc55b4eaf2b6bc5b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6528971fdce0dfc0a28fec42c151a1eccdabadf5",
                    "reference_id": "6528971fdce0dfc0a28fec42c151a1eccdabadf5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6528971fdce0dfc0a28fec42c151a1eccdabadf5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/c4079a34c0adef9f35a16783fb13a9084406f96d",
                    "reference_id": "c4079a34c0adef9f35a16783fb13a9084406f96d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/c4079a34c0adef9f35a16783fb13a9084406f96d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50390"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yrka-zpny-hbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78235?format=api",
            "vulnerability_id": "VCID-yrxe-ak75-qfhh",
            "summary": "kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19431",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19493",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19454",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19343",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22931",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22946",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23047",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23091",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23024",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22987",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511",
                    "reference_id": "2225511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418",
                    "reference_id": "RHSA-2023:7418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7419",
                    "reference_id": "RHSA-2023:7419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7419"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7423",
                    "reference_id": "RHSA-2023:7423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7424",
                    "reference_id": "RHSA-2023:7424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7558",
                    "reference_id": "RHSA-2023:7558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0261",
                    "reference_id": "RHSA-2024:0261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0262",
                    "reference_id": "RHSA-2024:0262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0262"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4206"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yrxe-ak75-qfhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67356?format=api",
            "vulnerability_id": "VCID-yxah-yhn3-t3cd",
            "summary": "kernel: Linux kernel: Integer overflow in iwlwifi debugfs function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53524.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53524.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0435",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04358",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53524"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53524"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400791",
                    "reference_id": "2400791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53524"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxah-yhn3-t3cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65744?format=api",
            "vulnerability_id": "VCID-yy39-8y66-p3cc",
            "summary": "kernel: Linux kernel: Memory leak in stm32-pwr regulator driver can lead to denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54097.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54097.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10834",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14443",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14484",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14429",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54097"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54097"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425132",
                    "reference_id": "2425132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-54097"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy39-8y66-p3cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70107?format=api",
            "vulnerability_id": "VCID-yyky-tmx3-mqg7",
            "summary": "kernel: drm/amd/display: Fix optc2_configure warning on dcn314",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49773.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49773.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21987",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49773"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363477",
                    "reference_id": "2363477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49773"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyky-tmx3-mqg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66264?format=api",
            "vulnerability_id": "VCID-z2g9-7jjb-m7g4",
            "summary": "kernel: Linux kernel: Denial of Service due to deadlock in Universal Flash Storage driver",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06301",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10572",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10539",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10368",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10481",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10479",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53760"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419898",
                    "reference_id": "2419898",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419898"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53760"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z2g9-7jjb-m7g4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78237?format=api",
            "vulnerability_id": "VCID-zbbv-tgna-hybm",
            "summary": "kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08446",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08418",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0835",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08303",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10614",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1048",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10638",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10598",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10524",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10597",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10657",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511",
                    "reference_id": "2225511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901",
                    "reference_id": "RHSA-2023:6901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6901"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418",
                    "reference_id": "RHSA-2023:7418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7419",
                    "reference_id": "RHSA-2023:7419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7419"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7423",
                    "reference_id": "RHSA-2023:7423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7424",
                    "reference_id": "RHSA-2023:7424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539",
                    "reference_id": "RHSA-2023:7539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7558",
                    "reference_id": "RHSA-2023:7558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0261",
                    "reference_id": "RHSA-2024:0261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0262",
                    "reference_id": "RHSA-2024:0262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0262"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-4208"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbv-tgna-hybm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67833?format=api",
            "vulnerability_id": "VCID-zd8r-gj19-8qax",
            "summary": "kernel: drm/amdkfd: Fix double release compute pasid",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50303.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50303.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03685",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03671",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04786",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0482",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04859",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04872",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0487",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04918",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04705",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04672",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04639",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04647",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50303"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395264",
                    "reference_id": "2395264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50303"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zd8r-gj19-8qax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66948?format=api",
            "vulnerability_id": "VCID-zdg9-tmxs-kff2",
            "summary": "kernel: drm/amdkfd: Fix memory leakage",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50528.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50528.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0355",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04465",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04438",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50528"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402195",
                    "reference_id": "2402195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50528"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdg9-tmxs-kff2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73463?format=api",
            "vulnerability_id": "VCID-zf76-9xyr-4ua7",
            "summary": "kernel: perf: Fix perf_pending_task() UaF",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48950.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48950.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13624",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13686",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13655",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13558",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13467",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1368",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13763",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13745",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13696",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13607",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13603",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13677",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48950"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320683",
                    "reference_id": "2320683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320683"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/517e6a301f34613bff24a8e35b5455884f2d83d8",
                    "reference_id": "517e6a301f34613bff24a8e35b5455884f2d83d8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:21:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/517e6a301f34613bff24a8e35b5455884f2d83d8"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/78e1317a174edbfd1182599bf76c092a2877672c",
                    "reference_id": "78e1317a174edbfd1182599bf76c092a2877672c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:21:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/78e1317a174edbfd1182599bf76c092a2877672c"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/8bffa95ac19ff27c8261904f89d36c7fcf215d59",
                    "reference_id": "8bffa95ac19ff27c8261904f89d36c7fcf215d59",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:21:45Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/8bffa95ac19ff27c8261904f89d36c7fcf215d59"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48950"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zf76-9xyr-4ua7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66133?format=api",
            "vulnerability_id": "VCID-zjt4-avr3-kkh7",
            "summary": "kernel: bpf: Fix reference state management for synchronous callbacks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50650.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50650.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50650",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06371",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07451",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0749",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07471",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07529",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07552",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10095",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10073",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10206",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10185",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10163",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10105",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10045",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50650"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420299",
                    "reference_id": "2420299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-50650"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjt4-avr3-kkh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67972?format=api",
            "vulnerability_id": "VCID-zkhc-9mvm-83c2",
            "summary": "kernel: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53205.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53205.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03487",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04645",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04687",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04722",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04747",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04744",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04782",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04557",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04541",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53205"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395415",
                    "reference_id": "2395415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395415"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138",
                    "reference_id": "RHSA-2024:3138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3138"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53205"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkhc-9mvm-83c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67950?format=api",
            "vulnerability_id": "VCID-zr4c-ztay-tudd",
            "summary": "kernel: USB: uhci: fix memory leak with using debugfs_lookup()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04111",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03961",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03945",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03915",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03899",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04041",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53197"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395390",
                    "reference_id": "2395390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53197"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zr4c-ztay-tudd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71085?format=api",
            "vulnerability_id": "VCID-zrwn-bkw6-nfb8",
            "summary": "kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49316.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49316.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05919",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05887",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09997",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09976",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10041",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10001",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09979",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09855",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09826",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09975",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10004",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09969",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09912",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09833",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49316"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/08d7a26d115cc7892668baa9750f64bd8baca29b",
                    "reference_id": "08d7a26d115cc7892668baa9750f64bd8baca29b",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/08d7a26d115cc7892668baa9750f64bd8baca29b"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/0ee5b9644f06b4d3cdcd9544f43f63312e425a4c",
                    "reference_id": "0ee5b9644f06b4d3cdcd9544f43f63312e425a4c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/0ee5b9644f06b4d3cdcd9544f43f63312e425a4c"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347650",
                    "reference_id": "2347650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347650"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6949493884fe88500de4af182588e071cf1544ee",
                    "reference_id": "6949493884fe88500de4af182588e071cf1544ee",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6949493884fe88500de4af182588e071cf1544ee"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010",
                    "reference_id": "6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/6b3fc1496e7227cd6a39a80bbfb7588ef7c7a010"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a2b3be930e79cc5d9d829f158e31172b2043f0cd",
                    "reference_id": "a2b3be930e79cc5d9d829f158e31172b2043f0cd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a2b3be930e79cc5d9d829f158e31172b2043f0cd"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e",
                    "reference_id": "d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/d4c2a041ed3ba114502d5ed6ace5b1a48d637a8e"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/ea759ae0a9ae5acee677d722129710ac89cc59c1",
                    "reference_id": "ea759ae0a9ae5acee677d722129710ac89cc59c1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:59Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/ea759ae0a9ae5acee677d722129710ac89cc59c1"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000",
                    "reference_id": "RHSA-2024:7000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7000"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-49316"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrwn-bkw6-nfb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69823?format=api",
            "vulnerability_id": "VCID-zsdd-9uv1-6ybs",
            "summary": "kernel: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1956",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19417",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19307",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19396",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363714",
                    "reference_id": "2363714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077",
                    "reference_id": "RHSA-2023:7077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7077"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53124"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdd-9uv1-6ybs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67307?format=api",
            "vulnerability_id": "VCID-zt19-xh97-sfeg",
            "summary": "kernel: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03767",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53489"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400741",
                    "reference_id": "2400741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53489"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zt19-xh97-sfeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70646?format=api",
            "vulnerability_id": "VCID-zut5-x18q-r7ac",
            "summary": "kernel: cifs: Fix oops due to uncleared server->smbd_conn in reconnect",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53006.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53006.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0129",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06855",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06944",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06975",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06976",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07023",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07006",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0701",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07729",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53006"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355432",
                    "reference_id": "2355432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53006"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zut5-x18q-r7ac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70683?format=api",
            "vulnerability_id": "VCID-zyay-v8hj-w7hg",
            "summary": "kernel: dmaengine: tegra: Fix memory leak in terminate_all()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53014.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53014.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0357",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25334",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53014"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355473",
                    "reference_id": "2355473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355473"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/567128076d554e41609c61b7d447089094ff72c5",
                    "reference_id": "567128076d554e41609c61b7d447089094ff72c5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/567128076d554e41609c61b7d447089094ff72c5"
                },
                {
                    "reference_url": "https://git.kernel.org/stable/c/a7a7ee6f5a019ad72852c001abbce50d35e992f2",
                    "reference_id": "a7a7ee6f5a019ad72852c001abbce50d35e992f2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:36Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/stable/c/a7a7ee6f5a019ad72852c001abbce50d35e992f2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-53014"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyay-v8hj-w7hg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78687?format=api",
            "vulnerability_id": "VCID-zyy4-6bjt-6ycf",
            "summary": "kernel: Type confusion in pick_next_rt_entity()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05407",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05441",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05447",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05482",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05504",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05478",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05464",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05457",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06653",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0629",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06302",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06468",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0649",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06502",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06524",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1077"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173436",
                    "reference_id": "2173436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583",
                    "reference_id": "RHSA-2023:6583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6583"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6033-1/",
                    "reference_id": "USN-6033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6171-1/",
                    "reference_id": "USN-6171-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6171-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6172-1/",
                    "reference_id": "USN-6172-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6172-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6185-1/",
                    "reference_id": "USN-6185-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6185-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6187-1/",
                    "reference_id": "USN-6187-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6187-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6207-1/",
                    "reference_id": "USN-6207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6222-1/",
                    "reference_id": "USN-6222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6222-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6223-1/",
                    "reference_id": "USN-6223-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6223-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6256-1/",
                    "reference_id": "USN-6256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6256-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-1077"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyy4-6bjt-6ycf"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-362.8.1%3Farch=el9_3"
}