{"url":"http://public2.vulnerablecode.io/api/packages/87566?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-513.5.1?arch=el8_9","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-513.5.1","qualifiers":{"arch":"el8_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65551?format=json","vulnerability_id":"VCID-138j-qpva-83g6","summary":"kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54015.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54015","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424936","reference_id":"2424936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54015"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-138j-qpva-83g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79920?format=json","vulnerability_id":"VCID-1a4w-wmuv-bkgp","summary":"kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43975","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05316","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05215","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05265","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05309","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05319","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05118","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05011","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05226","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989","reference_id":"2024989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989"},{"reference_url":"https://security.archlinux.org/AVG-2610","reference_id":"AVG-2610","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2610"},{"reference_url":"https://security.archlinux.org/AVG-2611","reference_id":"AVG-2611","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2611"},{"reference_url":"https://security.archlinux.org/AVG-2612","reference_id":"AVG-2612","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2612"},{"reference_url":"https://security.archlinux.org/AVG-2613","reference_id":"AVG-2613","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5337-1/","reference_id":"USN-5337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5337-1/"},{"reference_url":"https://usn.ubuntu.com/5368-1/","reference_id":"USN-5368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5368-1/"},{"reference_url":"https://usn.ubuntu.com/5385-1/","reference_id":"USN-5385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5385-1/"}],"fixed_packages":[],"aliases":["CVE-2021-43975"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4w-wmuv-bkgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78921?format=json","vulnerability_id":"VCID-1b2u-7w7f-wudv","summary":"kernel: use-after-free due to race condition in qdisc_graft()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05848","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05764","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0583","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05844","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741","reference_id":"2165741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7382","reference_id":"RHSA-2023:7382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7389","reference_id":"RHSA-2023:7389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7389"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0590"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65356?format=json","vulnerability_id":"VCID-1c14-gjcb-yfaa","summary":"kernel: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54202.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54202","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54202"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426132","reference_id":"2426132","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54202"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1c14-gjcb-yfaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67491?format=json","vulnerability_id":"VCID-1et7-qezd-1bea","summary":"kernel: net: sched: fix memory leak in tcindex_set_parms","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50396","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03301","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03481","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03474","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03469","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b","reference_id":"01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b"},{"reference_url":"https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6","reference_id":"18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396378","reference_id":"2396378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396378"},{"reference_url":"https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd","reference_id":"372ae77cf11d11fb118cbe2d37def9dd5f826abd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd"},{"reference_url":"https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7","reference_id":"399ab7fe0fa0d846881685fd4e57e9a8ef7559f7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7"},{"reference_url":"https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd","reference_id":"3abebc503a5148072052c229c6b04b329a420ecd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd"},{"reference_url":"https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0","reference_id":"53af9c793f644d5841d84d8e0ad83bd7ab47f3e0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0"},{"reference_url":"https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71","reference_id":"55ac68b53f1cea1926ee2313afc5d66b91daad71","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71"},{"reference_url":"https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b","reference_id":"6c55953e232ea668731091d111066521f3b7719b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b"},{"reference_url":"https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480","reference_id":"7a6fb69bbcb21e9ce13bdf18c008c268874f0480","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480"},{"reference_url":"https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19","reference_id":"7c183dc0af472dec33d2c0786a5e356baa8cad19","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19"},{"reference_url":"https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1","reference_id":"b314f6c3512108d7a656c5caf07c82d1bbbdc0f1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1"},{"reference_url":"https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39","reference_id":"c4de6057e7c6654983acb63d939d26ac0d7bbf39","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39"},{"reference_url":"https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8","reference_id":"facc4405e8b7407e03216207b1d1d640127de0c8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50396"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1et7-qezd-1bea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67953?format=json","vulnerability_id":"VCID-1h1a-a6zz-fycq","summary":"kernel: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50247.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50247","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04236","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50247"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395393","reference_id":"2395393","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50247"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1h1a-a6zz-fycq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69882?format=json","vulnerability_id":"VCID-1kuj-tvuz-37a4","summary":"kernel: net/mlx5e: Fix cleanup null-ptr deref on encap lock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53105.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53105","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363776","reference_id":"2363776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53105"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kuj-tvuz-37a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65353?format=json","vulnerability_id":"VCID-1pbx-w7ed-4be2","summary":"kernel: Linux kernel: Memory leak in mt76 Wi-Fi driver leads to Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54191.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54191","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10551","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54191"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426129","reference_id":"2426129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54191"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pbx-w7ed-4be2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65792?format=json","vulnerability_id":"VCID-1rxf-6vz4-j3ht","summary":"kernel: Kernel: NULL pointer dereference in Intel GVT-g debugfs during device removal","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54098.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54098","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425180","reference_id":"2425180","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54098"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rxf-6vz4-j3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67197?format=json","vulnerability_id":"VCID-1sd7-kt5u-wkbw","summary":"kernel: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53582.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53582","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53582"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401559","reference_id":"2401559","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53582"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1sd7-kt5u-wkbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78864?format=json","vulnerability_id":"VCID-1vns-urfn-93dn","summary":"kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28328","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0223","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03328","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03278","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0332","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28328"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389","reference_id":"2177389","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-28328"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vns-urfn-93dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66290?format=json","vulnerability_id":"VCID-1yb7-hxdh-ybdm","summary":"kernel: dm cache: free background tracker's queued work in btracker_destroy","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53765.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53765","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53765"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419938","reference_id":"2419938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53765"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1yb7-hxdh-ybdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67765?format=json","vulnerability_id":"VCID-1yk5-p6v6-vkb7","summary":"kernel: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53320.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53320","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0187","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02616","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02671","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395866","reference_id":"2395866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395866"},{"reference_url":"https://git.kernel.org/stable/c/2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2","reference_id":"2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"}],"url":"https://git.kernel.org/stable/c/2f3d3fa5b8ed7d3b147478f42b00b468eeb1ecd2"},{"reference_url":"https://git.kernel.org/stable/c/8ba997b22f2cd5d29aad8c39f6201f7608ed0c04","reference_id":"8ba997b22f2cd5d29aad8c39f6201f7608ed0c04","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"}],"url":"https://git.kernel.org/stable/c/8ba997b22f2cd5d29aad8c39f6201f7608ed0c04"},{"reference_url":"https://git.kernel.org/stable/c/fb428a2005fc1260d18b989cc5199f281617f44d","reference_id":"fb428a2005fc1260d18b989cc5199f281617f44d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:12Z/"}],"url":"https://git.kernel.org/stable/c/fb428a2005fc1260d18b989cc5199f281617f44d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53320"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1yk5-p6v6-vkb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65694?format=json","vulnerability_id":"VCID-24gs-ss6s-2ka7","summary":"kernel: Kernel: Denial of Service due to memory leak in RAID10 functionality","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54123.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54123.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54123","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425082","reference_id":"2425082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2023-54123"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24gs-ss6s-2ka7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65683?format=json","vulnerability_id":"VCID-26jx-suvc-dyba","summary":"kernel: nvmet-tcp: add bounds check on Transfer Tag","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50717.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50717","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50717"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425070","reference_id":"2425070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3810","reference_id":"RHSA-2024:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3810"}],"fixed_packages":[],"aliases":["CVE-2022-50717"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26jx-suvc-dyba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70009?format=json","vulnerability_id":"VCID-27mk-jmq8-afcn","summary":"kernel: net: macvlan: fix memory leaks of macvlan_common_newlink","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49853.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49853","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15562","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15522","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/21d3a8b6a1e39e7529ce9de07316ee13a63f305b","reference_id":"21d3a8b6a1e39e7529ce9de07316ee13a63f305b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/21d3a8b6a1e39e7529ce9de07316ee13a63f305b"},{"reference_url":"https://git.kernel.org/stable/c/23569b5652ee8e8e55a12f7835f59af6f3cefc30","reference_id":"23569b5652ee8e8e55a12f7835f59af6f3cefc30","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/23569b5652ee8e8e55a12f7835f59af6f3cefc30"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363383","reference_id":"2363383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363383"},{"reference_url":"https://git.kernel.org/stable/c/685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e","reference_id":"685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e"},{"reference_url":"https://git.kernel.org/stable/c/956e0216a19994443c90ba2ea6b0b284c9c4f9cb","reference_id":"956e0216a19994443c90ba2ea6b0b284c9c4f9cb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/956e0216a19994443c90ba2ea6b0b284c9c4f9cb"},{"reference_url":"https://git.kernel.org/stable/c/9ea003c4671b2fc455320ecf6d4a43b0a3c1878a","reference_id":"9ea003c4671b2fc455320ecf6d4a43b0a3c1878a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/9ea003c4671b2fc455320ecf6d4a43b0a3c1878a"},{"reference_url":"https://git.kernel.org/stable/c/9f288e338be206713d79b29144c27fca4503c39b","reference_id":"9f288e338be206713d79b29144c27fca4503c39b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/9f288e338be206713d79b29144c27fca4503c39b"},{"reference_url":"https://git.kernel.org/stable/c/a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e","reference_id":"a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e"},{"reference_url":"https://git.kernel.org/stable/c/a8d67367ab33604326cc37ab44fd1801bf5691ba","reference_id":"a8d67367ab33604326cc37ab44fd1801bf5691ba","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:07:26Z/"}],"url":"https://git.kernel.org/stable/c/a8d67367ab33604326cc37ab44fd1801bf5691ba"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49853"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-27mk-jmq8-afcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70121?format=json","vulnerability_id":"VCID-28xv-c46q-z3fz","summary":"kernel: ipv6: fix WARNING in ip6_route_net_exit_late()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49903.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49903.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49903","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15522","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15562","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49903"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363491","reference_id":"2363491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49903"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-28xv-c46q-z3fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67919?format=json","vulnerability_id":"VCID-2bhz-r95r-xudm","summary":"kernel: drm/radeon: Add the missed acpi_put_table() to fix memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50275.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50275.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50275","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50275"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50275","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50275"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395356","reference_id":"2395356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50275"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bhz-r95r-xudm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77897?format=json","vulnerability_id":"VCID-2dcp-rju9-m7ce","summary":"kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0443.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0443","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02339","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02305","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02347","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02343","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02288","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/","reference_id":"20221215033132.230023-3-longman@redhat.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257968","reference_id":"2257968","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257968"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0443","reference_id":"CVE-2024-0443","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:55:26Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7370"}],"fixed_packages":[],"aliases":["CVE-2024-0443"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcp-rju9-m7ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78508?format=json","vulnerability_id":"VCID-2n9k-dqfk-gkb9","summary":"kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31084","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01132","published_at":"2026-05-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0083","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00829","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00857","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00861","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00869","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00816","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00815","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0082","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00831","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00834","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139","reference_id":"2213139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/","reference_id":"6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/","reference_id":"AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/"},{"reference_url":"https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/","reference_id":"CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5448","reference_id":"dsa-5448","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5448"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","reference_id":"?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0003/","reference_id":"ntap-20230929-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230929-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6338-1/","reference_id":"USN-6338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6338-1/"},{"reference_url":"https://usn.ubuntu.com/6338-2/","reference_id":"USN-6338-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6338-2/"},{"reference_url":"https://usn.ubuntu.com/6339-1/","reference_id":"USN-6339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-1/"},{"reference_url":"https://usn.ubuntu.com/6339-2/","reference_id":"USN-6339-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-2/"},{"reference_url":"https://usn.ubuntu.com/6339-3/","reference_id":"USN-6339-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-3/"},{"reference_url":"https://usn.ubuntu.com/6339-4/","reference_id":"USN-6339-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-4/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6344-1/","reference_id":"USN-6344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6344-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6350-1/","reference_id":"USN-6350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6350-1/"},{"reference_url":"https://usn.ubuntu.com/6351-1/","reference_id":"USN-6351-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6351-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-31084"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67539?format=json","vulnerability_id":"VCID-2qkf-h5gz-eue4","summary":"kernel: scsi: mpi3mr: Use number of bits to manage bitmap sizes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53376.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53376","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00744","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00733","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00741","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00746","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00745","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00737","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00727","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00728","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00938","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0094","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00935","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00933","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00926","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00921","published_at":"2026-05-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00879","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00887","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00936","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00941","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00945","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53376"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396429","reference_id":"2396429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396429"},{"reference_url":"https://git.kernel.org/stable/c/339e61565f81a6534afdc18fd854b2e2628bf5db","reference_id":"339e61565f81a6534afdc18fd854b2e2628bf5db","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"}],"url":"https://git.kernel.org/stable/c/339e61565f81a6534afdc18fd854b2e2628bf5db"},{"reference_url":"https://git.kernel.org/stable/c/6a675a6d57d31da43d8da576465c1cd5d5b0bd3d","reference_id":"6a675a6d57d31da43d8da576465c1cd5d5b0bd3d","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"}],"url":"https://git.kernel.org/stable/c/6a675a6d57d31da43d8da576465c1cd5d5b0bd3d"},{"reference_url":"https://git.kernel.org/stable/c/8ac713d2e9845e9234bb12ae5903040685d5aff9","reference_id":"8ac713d2e9845e9234bb12ae5903040685d5aff9","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:54:58Z/"}],"url":"https://git.kernel.org/stable/c/8ac713d2e9845e9234bb12ae5903040685d5aff9"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53376"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2qkf-h5gz-eue4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67548?format=json","vulnerability_id":"VCID-2zmv-e7yv-1bg3","summary":"kernel: drivers: base: component: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53409.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53409","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04066","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04057","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53409"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/09709a49283f79184c998d6dafcc01590e4d654d","reference_id":"09709a49283f79184c998d6dafcc01590e4d654d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"}],"url":"https://git.kernel.org/stable/c/09709a49283f79184c998d6dafcc01590e4d654d"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396454","reference_id":"2396454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396454"},{"reference_url":"https://git.kernel.org/stable/c/79ac2b01e033181e21cc84216ace1f4160eb8950","reference_id":"79ac2b01e033181e21cc84216ace1f4160eb8950","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"}],"url":"https://git.kernel.org/stable/c/79ac2b01e033181e21cc84216ace1f4160eb8950"},{"reference_url":"https://git.kernel.org/stable/c/8deb87b1e810dd558371e88ffd44339fbef27870","reference_id":"8deb87b1e810dd558371e88ffd44339fbef27870","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"}],"url":"https://git.kernel.org/stable/c/8deb87b1e810dd558371e88ffd44339fbef27870"},{"reference_url":"https://git.kernel.org/stable/c/bf0fd01c7cc1061fb2cfda3e2044371642108e6c","reference_id":"bf0fd01c7cc1061fb2cfda3e2044371642108e6c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:03:50Z/"}],"url":"https://git.kernel.org/stable/c/bf0fd01c7cc1061fb2cfda3e2044371642108e6c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53409"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2zmv-e7yv-1bg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67531?format=json","vulnerability_id":"VCID-36pz-ffad-1fch","summary":"kernel: mlx5: fix possible ptp queue fifo use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53398.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53398.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53398","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0187","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02616","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02671","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53398"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396421","reference_id":"2396421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396421"},{"reference_url":"https://git.kernel.org/stable/c/3a50cf1e8e5157b82268eee7e330dbe5736a0948","reference_id":"3a50cf1e8e5157b82268eee7e330dbe5736a0948","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"}],"url":"https://git.kernel.org/stable/c/3a50cf1e8e5157b82268eee7e330dbe5736a0948"},{"reference_url":"https://git.kernel.org/stable/c/52e6e7a0bc04c85012a9251c7cf2d444a77eb966","reference_id":"52e6e7a0bc04c85012a9251c7cf2d444a77eb966","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"}],"url":"https://git.kernel.org/stable/c/52e6e7a0bc04c85012a9251c7cf2d444a77eb966"},{"reference_url":"https://git.kernel.org/stable/c/6afdedc4e66e3846ce497744f01b95c34bf39d21","reference_id":"6afdedc4e66e3846ce497744f01b95c34bf39d21","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:00:48Z/"}],"url":"https://git.kernel.org/stable/c/6afdedc4e66e3846ce497744f01b95c34bf39d21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53398"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36pz-ffad-1fch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67098?format=json","vulnerability_id":"VCID-38gu-4nx1-jfhy","summary":"kernel: wifi: ath11k: fix memory leak in WMI firmware stats","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53602.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53602","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401460","reference_id":"2401460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53602"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38gu-4nx1-jfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66128?format=json","vulnerability_id":"VCID-3buq-88qc-efgw","summary":"kernel: perf tool x86: Fix perf_env memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53793.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53793.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53793","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53793"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420294","reference_id":"2420294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53793"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3buq-88qc-efgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65415?format=json","vulnerability_id":"VCID-3e91-ctqb-8kc9","summary":"kernel: net/sched: flower: fix filter idr initialization","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54206.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54206","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10551","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426193","reference_id":"2426193","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54206"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3e91-ctqb-8kc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66998?format=json","vulnerability_id":"VCID-3geu-x5r8-4yb8","summary":"kernel: drm/amdgpu: Fix size validation for non-exclusive domains (v4)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50527.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50527","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0211","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402249","reference_id":"2402249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50527"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3geu-x5r8-4yb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73461?format=json","vulnerability_id":"VCID-3jr3-h29m-fqg5","summary":"kernel: memcg: fix possible use-after-free in memcg_write_event_control()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48988.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48988","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02187","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02181","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02158","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02171","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02133","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc","reference_id":"0ed074317b835caa6c03bcfa8f133365324673dc","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320681","reference_id":"2320681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320681"},{"reference_url":"https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917","reference_id":"35963b31821920908e397146502066f6b032c917","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917"},{"reference_url":"https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088","reference_id":"4a7ba45b1a435e7097ca0f79a847d0949d0eb088","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088"},{"reference_url":"https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13","reference_id":"aad8bbd17a1d586005feb9226c2e9cfce1432e13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13"},{"reference_url":"https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125","reference_id":"b77600e26fd48727a95ffd50ba1e937efb548125","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125"},{"reference_url":"https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8","reference_id":"e1ae97624ecf400ea56c238bff23e5cd139df0b8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8"},{"reference_url":"https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad","reference_id":"f1f7f36cf682fa59db15e2089039a2eeb58ff2ad","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:57Z/"}],"url":"https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-48988"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jr3-h29m-fqg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65687?format=json","vulnerability_id":"VCID-3nkq-cb9e-tub6","summary":"kernel: wifi: rtw88: use work to update rate to avoid RCU warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54071.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54071","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54071"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425074","reference_id":"2425074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54071"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3nkq-cb9e-tub6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66234?format=json","vulnerability_id":"VCID-3tbb-nsen-3bbd","summary":"kernel: wifi: ath12k: Handle lock during peer_id find","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53764.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53764.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53764","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06396","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06373","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06387","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10572","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53764"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419850","reference_id":"2419850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53764"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tbb-nsen-3bbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69228?format=json","vulnerability_id":"VCID-3x76-32nw-1yek","summary":"kernel: net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50046.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50046","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50046"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373511","reference_id":"2373511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50046"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3x76-32nw-1yek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67040?format=json","vulnerability_id":"VCID-3xa4-a7x2-huh7","summary":"kernel: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50515.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50515","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402292","reference_id":"2402292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50515"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xa4-a7x2-huh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67379?format=json","vulnerability_id":"VCID-3xez-gzc6-tuh5","summary":"kernel: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53521.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53521.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53521","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400814","reference_id":"2400814","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10772","reference_id":"RHSA-2024:10772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10772"}],"fixed_packages":[],"aliases":["CVE-2023-53521"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xez-gzc6-tuh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67599?format=json","vulnerability_id":"VCID-477g-7889-57dq","summary":"kernel: wifi: iwlwifi: fw: fix memory leak in debugfs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53422.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53422","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53422"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396527","reference_id":"2396527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396527"},{"reference_url":"https://git.kernel.org/stable/c/37f64bc8e001f216566d17ef9fd5608c762ebcd4","reference_id":"37f64bc8e001f216566d17ef9fd5608c762ebcd4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/37f64bc8e001f216566d17ef9fd5608c762ebcd4"},{"reference_url":"https://git.kernel.org/stable/c/3d90d2f4a018fe8cfd65068bc6350b6222be4852","reference_id":"3d90d2f4a018fe8cfd65068bc6350b6222be4852","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/3d90d2f4a018fe8cfd65068bc6350b6222be4852"},{"reference_url":"https://git.kernel.org/stable/c/89496d6cff297c88fe0286a440c380ceb172da2b","reference_id":"89496d6cff297c88fe0286a440c380ceb172da2b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/89496d6cff297c88fe0286a440c380ceb172da2b"},{"reference_url":"https://git.kernel.org/stable/c/b830ba20b43be52eae7d4087b61a0079dec56820","reference_id":"b830ba20b43be52eae7d4087b61a0079dec56820","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/b830ba20b43be52eae7d4087b61a0079dec56820"},{"reference_url":"https://git.kernel.org/stable/c/e302e9ca14a86a80eadfb24a34d8675aadaf3ef3","reference_id":"e302e9ca14a86a80eadfb24a34d8675aadaf3ef3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/e302e9ca14a86a80eadfb24a34d8675aadaf3ef3"},{"reference_url":"https://git.kernel.org/stable/c/fe17124282da055cb2e53f0131521459b5c7866c","reference_id":"fe17124282da055cb2e53f0131521459b5c7866c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:28Z/"}],"url":"https://git.kernel.org/stable/c/fe17124282da055cb2e53f0131521459b5c7866c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-477g-7889-57dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69790?format=json","vulnerability_id":"VCID-49dd-kxn1-jub7","summary":"kernel: drm/i915/active: Fix misuse of non-idle barriers as fence trackers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53087.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53087","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19391","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19387","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363680","reference_id":"2363680","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53087"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49dd-kxn1-jub7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66961?format=json","vulnerability_id":"VCID-4fqf-6kxn-cybn","summary":"kernel: drm/i915/gvt: fix vgpu debugfs clean in remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53625.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53625","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03338","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402211","reference_id":"2402211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53625"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fqf-6kxn-cybn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65336?format=json","vulnerability_id":"VCID-4g4s-7yz9-kbdj","summary":"kernel: media: usb: siano: Fix use after free bugs caused by do_submit_urb","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54270.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54270","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426112","reference_id":"2426112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"}],"fixed_packages":[],"aliases":["CVE-2023-54270"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4g4s-7yz9-kbdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79048?format=json","vulnerability_id":"VCID-4gq7-1egy-p7a4","summary":"kernel: vmwgfx: use-after-free in vmw_cmd_res_check","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38457","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12925","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12899","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13332","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13095","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455","reference_id":"2133455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4831"}],"fixed_packages":[],"aliases":["CVE-2022-38457"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69400?format=json","vulnerability_id":"VCID-4mhb-xwq8-xyh8","summary":"kernel: net: atlantic: fix aq_vec index out of range error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50066","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20558","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20493","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683","reference_id":"2373683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10671","reference_id":"RHSA-2025:10671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10673","reference_id":"RHSA-2025:10673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10675","reference_id":"RHSA-2025:10675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10761","reference_id":"RHSA-2025:10761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10828","reference_id":"RHSA-2025:10828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10834","reference_id":"RHSA-2025:10834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11358","reference_id":"RHSA-2025:11358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11375","reference_id":"RHSA-2025:11375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11375"}],"fixed_packages":[],"aliases":["CVE-2022-50066"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mhb-xwq8-xyh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71664?format=json","vulnerability_id":"VCID-4qre-11tg-3fba","summary":"kernel: cipso: Fix data-races around sysctl.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49639.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49639","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08816","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08735","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08788","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09645","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11348","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11239","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49639"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348239","reference_id":"2348239","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49639"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qre-11tg-3fba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67130?format=json","vulnerability_id":"VCID-4rx9-jqte-1beh","summary":"kernel: net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53578.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53578","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03059","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02993","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03122","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04369","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04372","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53578"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401492","reference_id":"2401492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53578"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rx9-jqte-1beh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69887?format=json","vulnerability_id":"VCID-4tkw-gmmk-aqb6","summary":"kernel: net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53110.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53110.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53110","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19391","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19387","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53110"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363781","reference_id":"2363781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53110"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4tkw-gmmk-aqb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73515?format=json","vulnerability_id":"VCID-51fu-1f17-s7ct","summary":"kernel: char: tpm: Protect tpm_pm_suspend with locks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48997.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48997","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03822","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0376","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03765","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03816","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03695","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03757","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320774","reference_id":"2320774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320774"},{"reference_url":"https://git.kernel.org/stable/c/23393c6461422df5bf8084a086ada9a7e17dc2ba","reference_id":"23393c6461422df5bf8084a086ada9a7e17dc2ba","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"}],"url":"https://git.kernel.org/stable/c/23393c6461422df5bf8084a086ada9a7e17dc2ba"},{"reference_url":"https://git.kernel.org/stable/c/25b78bf98b07ff5aceb9b1e24f72ec0236c5c053","reference_id":"25b78bf98b07ff5aceb9b1e24f72ec0236c5c053","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"}],"url":"https://git.kernel.org/stable/c/25b78bf98b07ff5aceb9b1e24f72ec0236c5c053"},{"reference_url":"https://git.kernel.org/stable/c/4e0d6c687c925e27fd4bc78a2721d10acf5614d6","reference_id":"4e0d6c687c925e27fd4bc78a2721d10acf5614d6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"}],"url":"https://git.kernel.org/stable/c/4e0d6c687c925e27fd4bc78a2721d10acf5614d6"},{"reference_url":"https://git.kernel.org/stable/c/571b6bbbf54d835ea6120f65575cb55cd767e603","reference_id":"571b6bbbf54d835ea6120f65575cb55cd767e603","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"}],"url":"https://git.kernel.org/stable/c/571b6bbbf54d835ea6120f65575cb55cd767e603"},{"reference_url":"https://git.kernel.org/stable/c/d699373ac5f3545243d3c73a1ccab77fdef8cec6","reference_id":"d699373ac5f3545243d3c73a1ccab77fdef8cec6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:15:42Z/"}],"url":"https://git.kernel.org/stable/c/d699373ac5f3545243d3c73a1ccab77fdef8cec6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-48997"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51fu-1f17-s7ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67519?format=json","vulnerability_id":"VCID-5d3a-d4xk-n7d2","summary":"kernel: tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50389.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50389","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/08fd965521d0e172d540cf945517810895fcb199","reference_id":"08fd965521d0e172d540cf945517810895fcb199","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/08fd965521d0e172d540cf945517810895fcb199"},{"reference_url":"https://git.kernel.org/stable/c/0bd9b4be721c776f77adcaf34105dfca3007ddb9","reference_id":"0bd9b4be721c776f77adcaf34105dfca3007ddb9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/0bd9b4be721c776f77adcaf34105dfca3007ddb9"},{"reference_url":"https://git.kernel.org/stable/c/1af2232b13837ce0f3a082b9f43735b09aafc367","reference_id":"1af2232b13837ce0f3a082b9f43735b09aafc367","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/1af2232b13837ce0f3a082b9f43735b09aafc367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396409","reference_id":"2396409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396409"},{"reference_url":"https://git.kernel.org/stable/c/2fcd3dc8b97a14f1672729c86b7041a1a89b052a","reference_id":"2fcd3dc8b97a14f1672729c86b7041a1a89b052a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/2fcd3dc8b97a14f1672729c86b7041a1a89b052a"},{"reference_url":"https://git.kernel.org/stable/c/37e90c374dd11cf4919c51e847c6d6ced0abc555","reference_id":"37e90c374dd11cf4919c51e847c6d6ced0abc555","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/37e90c374dd11cf4919c51e847c6d6ced0abc555"},{"reference_url":"https://git.kernel.org/stable/c/927860dfa161ae8392a264197257dbdc52b26b0f","reference_id":"927860dfa161ae8392a264197257dbdc52b26b0f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/927860dfa161ae8392a264197257dbdc52b26b0f"},{"reference_url":"https://git.kernel.org/stable/c/986cd9a9b95423e35a2cbb8e9105aec0e0d7f337","reference_id":"986cd9a9b95423e35a2cbb8e9105aec0e0d7f337","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/986cd9a9b95423e35a2cbb8e9105aec0e0d7f337"},{"reference_url":"https://git.kernel.org/stable/c/b0785edaf649e5f04dc7f75533e810f4c00e4106","reference_id":"b0785edaf649e5f04dc7f75533e810f4c00e4106","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:57Z/"}],"url":"https://git.kernel.org/stable/c/b0785edaf649e5f04dc7f75533e810f4c00e4106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50389"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5d3a-d4xk-n7d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67046?format=json","vulnerability_id":"VCID-5gd6-emds-4qes","summary":"kernel: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50532.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50532","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402298","reference_id":"2402298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50532"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gd6-emds-4qes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78337?format=json","vulnerability_id":"VCID-5m63-9wck-6ud6","summary":"kernel: saa7134: race condition leading to use-after-free in saa7134_finidev()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35823","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01065","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0113","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01136","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01125","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0095","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00954","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00949","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00938","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00937","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00942","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00953","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00958","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215835","reference_id":"2215835","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215835"},{"reference_url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/","reference_id":"49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389","reference_id":"?id=30cf57da176cca80f11df0d9b7f71581fe601389","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230803-0002/","reference_id":"ntap-20230803-0002","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230803-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/","reference_id":"t","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-35823"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5m63-9wck-6ud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69843?format=json","vulnerability_id":"VCID-5qtf-w7q3-uyeb","summary":"kernel: dm stats: check for and propagate alloc_percpu failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53044.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53044","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19307","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19444","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363735","reference_id":"2363735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53044"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5qtf-w7q3-uyeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70699?format=json","vulnerability_id":"VCID-5uxv-qrgs-pqd3","summary":"kernel: HID: betop: check shape of output reports","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53015.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53015","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02007","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02033","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02784","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0282","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20961","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/07bc32e53c7bd5c91472cc485231ef6274db9b76","reference_id":"07bc32e53c7bd5c91472cc485231ef6274db9b76","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/07bc32e53c7bd5c91472cc485231ef6274db9b76"},{"reference_url":"https://git.kernel.org/stable/c/1a2a47b85cab50a3c146731bfeaf2d860f5344ee","reference_id":"1a2a47b85cab50a3c146731bfeaf2d860f5344ee","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/1a2a47b85cab50a3c146731bfeaf2d860f5344ee"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355491","reference_id":"2355491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355491"},{"reference_url":"https://git.kernel.org/stable/c/28fc6095da22dc88433d79578ae1c495ebe8ca43","reference_id":"28fc6095da22dc88433d79578ae1c495ebe8ca43","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/28fc6095da22dc88433d79578ae1c495ebe8ca43"},{"reference_url":"https://git.kernel.org/stable/c/3782c0d6edf658b71354a64d60aa7a296188fc90","reference_id":"3782c0d6edf658b71354a64d60aa7a296188fc90","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/3782c0d6edf658b71354a64d60aa7a296188fc90"},{"reference_url":"https://git.kernel.org/stable/c/7317326f685824c7c29bd80841fd18041af6bb73","reference_id":"7317326f685824c7c29bd80841fd18041af6bb73","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/7317326f685824c7c29bd80841fd18041af6bb73"},{"reference_url":"https://git.kernel.org/stable/c/d3065cc56221d1a5eda237e94eaf2a627b88ab79","reference_id":"d3065cc56221d1a5eda237e94eaf2a627b88ab79","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/d3065cc56221d1a5eda237e94eaf2a627b88ab79"},{"reference_url":"https://git.kernel.org/stable/c/dbab4dba400d6ea9a9697fbbd287adbf7db1dac4","reference_id":"dbab4dba400d6ea9a9697fbbd287adbf7db1dac4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:20:32Z/"}],"url":"https://git.kernel.org/stable/c/dbab4dba400d6ea9a9697fbbd287adbf7db1dac4"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"}],"fixed_packages":[],"aliases":["CVE-2023-53015"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5uxv-qrgs-pqd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71345?format=json","vulnerability_id":"VCID-5xs2-c9tp-s7eg","summary":"kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49492.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49492","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12403","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12287","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12427","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12488","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12484","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49492"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347913","reference_id":"2347913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347913"},{"reference_url":"https://git.kernel.org/stable/c/54a4c1e47d1b2585e74920399455bd9abbfb2bd7","reference_id":"54a4c1e47d1b2585e74920399455bd9abbfb2bd7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/54a4c1e47d1b2585e74920399455bd9abbfb2bd7"},{"reference_url":"https://git.kernel.org/stable/c/7a28556082d1fbcbc599baf1c24252dfc73efefc","reference_id":"7a28556082d1fbcbc599baf1c24252dfc73efefc","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/7a28556082d1fbcbc599baf1c24252dfc73efefc"},{"reference_url":"https://git.kernel.org/stable/c/8321b17789f614414206af07e17ce4751c95dc76","reference_id":"8321b17789f614414206af07e17ce4751c95dc76","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/8321b17789f614414206af07e17ce4751c95dc76"},{"reference_url":"https://git.kernel.org/stable/c/8da2b7bdb47e94bbc4062a3978c708926bcb022c","reference_id":"8da2b7bdb47e94bbc4062a3978c708926bcb022c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/8da2b7bdb47e94bbc4062a3978c708926bcb022c"},{"reference_url":"https://git.kernel.org/stable/c/906c81dba8ee8057523859b5e1a2479e9fd34860","reference_id":"906c81dba8ee8057523859b5e1a2479e9fd34860","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/906c81dba8ee8057523859b5e1a2479e9fd34860"},{"reference_url":"https://git.kernel.org/stable/c/9e649471b396fa0139d53919354ce1eace9b9a24","reference_id":"9e649471b396fa0139d53919354ce1eace9b9a24","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/9e649471b396fa0139d53919354ce1eace9b9a24"},{"reference_url":"https://git.kernel.org/stable/c/af98940dd33c9f9e1beb4f71c0a39260100e2a65","reference_id":"af98940dd33c9f9e1beb4f71c0a39260100e2a65","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/af98940dd33c9f9e1beb4f71c0a39260100e2a65"},{"reference_url":"https://git.kernel.org/stable/c/da42761181627e9bdc37d18368b827948a583929","reference_id":"da42761181627e9bdc37d18368b827948a583929","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/da42761181627e9bdc37d18368b827948a583929"},{"reference_url":"https://git.kernel.org/stable/c/f76729662650cd7bc8f8194e057af381370349a7","reference_id":"f76729662650cd7bc8f8194e057af381370349a7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:38:56Z/"}],"url":"https://git.kernel.org/stable/c/f76729662650cd7bc8f8194e057af381370349a7"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49492"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xs2-c9tp-s7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69852?format=json","vulnerability_id":"VCID-5yxn-gf61-qkfg","summary":"kernel: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53039.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53039","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20793","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20558","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20572","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363745","reference_id":"2363745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53039"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yxn-gf61-qkfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67132?format=json","vulnerability_id":"VCID-64gw-2b6h-c7em","summary":"kernel: driver core: fix resource leak in device_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53594.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53594","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401494","reference_id":"2401494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53594"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-64gw-2b6h-c7em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67610?format=json","vulnerability_id":"VCID-657g-4e3s-qbbb","summary":"kernel: iomap: iomap: fix memory corruption when recording errors during writeback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50406","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02705","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02684","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03733","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03753","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03725","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03786","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03791","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03579","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03718","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396538","reference_id":"2396538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396538"},{"reference_url":"https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2","reference_id":"3d5f3ba1ac28059bdf7000cae2403e4e984308d2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"}],"url":"https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2"},{"reference_url":"https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2","reference_id":"7308591d9c7787aec58f6a01a7823f14e90db7a2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"}],"url":"https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2"},{"reference_url":"https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6","reference_id":"82c66c46f73b88be74c869e2cbfef45281adf3c6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/"}],"url":"https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22998","reference_id":"RHSA-2025:22998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23463","reference_id":"RHSA-2025:23463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23947","reference_id":"RHSA-2025:23947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23960","reference_id":"RHSA-2025:23960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23960"}],"fixed_packages":[],"aliases":["CVE-2022-50406"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-657g-4e3s-qbbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65698?format=json","vulnerability_id":"VCID-673s-2xd7-tbbt","summary":"kernel: Linux kernel: Resource exhaustion in amdgpu due to PCI device reference count leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50760.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50760","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50760"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425086","reference_id":"2425086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50760"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-673s-2xd7-tbbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78664?format=json","vulnerability_id":"VCID-69a4-qgg3-hkg5","summary":"kernel: vmwgfx: race condition leading to information disclosure vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33951","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00304","published_at":"2026-05-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00289","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00312","published_at":"2026-04-24T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00306","published_at":"2026-05-09T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00303","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0031","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00308","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00299","published_at":"2026-05-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00297","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00296","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00293","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195","reference_id":"2218195","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-33951","reference_id":"CVE-2023-33951","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4831"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/","reference_id":"ZDI-CAN-20110","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"}],"fixed_packages":[],"aliases":["CVE-2023-33951"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69a4-qgg3-hkg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65708?format=json","vulnerability_id":"VCID-6aaf-fc5z-5uah","summary":"kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54102.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54102","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1372","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18102","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17963","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18053","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18156","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425096","reference_id":"2425096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54102"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6aaf-fc5z-5uah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69354?format=json","vulnerability_id":"VCID-6dg2-36gp-2feb","summary":"kernel: kernfs: fix potential NULL dereference in __kernfs_remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50148.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50148","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50148"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373637","reference_id":"2373637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"}],"fixed_packages":[],"aliases":["CVE-2022-50148"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dg2-36gp-2feb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78662?format=json","vulnerability_id":"VCID-6ehx-j3nb-2ffn","summary":"kernel: mpls: double free on sysctl allocation failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26545","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03391","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03214","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0332","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03342","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03383","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03321","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443","reference_id":"2182443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13","reference_id":"ChangeLog-6.1.13","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13"},{"reference_url":"https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_id":"fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_id":"?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230316-0009/","reference_id":"ntap-20230316-0009","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230316-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"},{"reference_url":"https://usn.ubuntu.com/6072-1/","reference_id":"USN-6072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6072-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-26545"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ehx-j3nb-2ffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65372?format=json","vulnerability_id":"VCID-6n6j-exu4-5qfq","summary":"kernel: md/raid10: fix memleak of md thread","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54294.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54294","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426149","reference_id":"2426149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2023-54294"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6n6j-exu4-5qfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66787?format=json","vulnerability_id":"VCID-6nbw-e9dp-gffj","summary":"kernel: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53717.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53717","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11905","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1204","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12096","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1207","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12097","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53717"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405741","reference_id":"2405741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53717"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6nbw-e9dp-gffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78724?format=json","vulnerability_id":"VCID-6nm8-f9v9-bqe3","summary":"kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0458","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30827","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30752","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30835","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219","reference_id":"2193219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219"},{"reference_url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11","reference_id":"739790605705ddcf18f21782b9c99ad7d53a8c11","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4801","reference_id":"RHSA-2023:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4814","reference_id":"RHSA-2023:4814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7","reference_id":"sys.c?id=v6.1.8&id2=v6.1.7","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6341-1/","reference_id":"USN-6341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6341-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0458"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6nm8-f9v9-bqe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67306?format=json","vulnerability_id":"VCID-6pku-1g91-1keq","summary":"kernel: Linux kernel: Denial of Service in vmwgfx due to invalid DMA surface copies","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50440.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50440","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400740","reference_id":"2400740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50440"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6pku-1g91-1keq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66283?format=json","vulnerability_id":"VCID-6ppb-wz59-qqhp","summary":"kernel: drm/amdgpu/powerplay/psm: Fix memory leak in power state init","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50617.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50617","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50617"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419926","reference_id":"2419926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50617"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ppb-wz59-qqhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65597?format=json","vulnerability_id":"VCID-6xec-53j6-fqaf","summary":"kernel: wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50701.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50701","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424982","reference_id":"2424982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50701"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xec-53j6-fqaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67511?format=json","vulnerability_id":"VCID-6y44-kbkm-w3fy","summary":"kernel: drivers: base: dd: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53390.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53390","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04066","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04057","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53390"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396398","reference_id":"2396398","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396398"},{"reference_url":"https://git.kernel.org/stable/c/36c893d3a759ae7c91ee7d4871ebfc7504f08c40","reference_id":"36c893d3a759ae7c91ee7d4871ebfc7504f08c40","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"}],"url":"https://git.kernel.org/stable/c/36c893d3a759ae7c91ee7d4871ebfc7504f08c40"},{"reference_url":"https://git.kernel.org/stable/c/5a7a9efdb193d3c8a35821548a8e99612c358828","reference_id":"5a7a9efdb193d3c8a35821548a8e99612c358828","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"}],"url":"https://git.kernel.org/stable/c/5a7a9efdb193d3c8a35821548a8e99612c358828"},{"reference_url":"https://git.kernel.org/stable/c/7f1e53f88e8babf293ec052b70aa9d2a3554360c","reference_id":"7f1e53f88e8babf293ec052b70aa9d2a3554360c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"}],"url":"https://git.kernel.org/stable/c/7f1e53f88e8babf293ec052b70aa9d2a3554360c"},{"reference_url":"https://git.kernel.org/stable/c/8e47e2bf78812adbd73c45c941d3c51add30b58d","reference_id":"8e47e2bf78812adbd73c45c941d3c51add30b58d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:58:54Z/"}],"url":"https://git.kernel.org/stable/c/8e47e2bf78812adbd73c45c941d3c51add30b58d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53390"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6y44-kbkm-w3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78339?format=json","vulnerability_id":"VCID-6znz-cyqz-7qeh","summary":"kernel: r592: race condition leading to use-after-free in r592_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837","reference_id":"2215837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"}],"fixed_packages":[],"aliases":["CVE-2023-35825"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6znz-cyqz-7qeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66143?format=json","vulnerability_id":"VCID-76ww-azwg-sfg1","summary":"kernel: drm/ttm: Don't leak a resource on swapout move error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53844.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53844","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53844"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420316","reference_id":"2420316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-53844"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76ww-azwg-sfg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65549?format=json","vulnerability_id":"VCID-7gjh-aev7-b7d1","summary":"kernel: scsi: mpi3mr: Fix an issue found by KASAN","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54011.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54011","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424934","reference_id":"2424934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54011"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gjh-aev7-b7d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67546?format=json","vulnerability_id":"VCID-7q6y-6qxn-q3dv","summary":"kernel: USB: ULPI: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53410.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53410","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02498","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02496","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02493","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02484","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02331","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02435","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53410"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396449","reference_id":"2396449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396449"},{"reference_url":"https://git.kernel.org/stable/c/2b8aa879e28df11e45855b04788050c61fb6b02a","reference_id":"2b8aa879e28df11e45855b04788050c61fb6b02a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"}],"url":"https://git.kernel.org/stable/c/2b8aa879e28df11e45855b04788050c61fb6b02a"},{"reference_url":"https://git.kernel.org/stable/c/8f4d25eba599c4bd4b5ea8ae8752cda480a9d563","reference_id":"8f4d25eba599c4bd4b5ea8ae8752cda480a9d563","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"}],"url":"https://git.kernel.org/stable/c/8f4d25eba599c4bd4b5ea8ae8752cda480a9d563"},{"reference_url":"https://git.kernel.org/stable/c/dcbe69f4f743a938344b32e60531ea55355e0c08","reference_id":"dcbe69f4f743a938344b32e60531ea55355e0c08","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:04:07Z/"}],"url":"https://git.kernel.org/stable/c/dcbe69f4f743a938344b32e60531ea55355e0c08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53410"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7q6y-6qxn-q3dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69848?format=json","vulnerability_id":"VCID-7uu6-ytsy-buh2","summary":"kernel: wifi: mt76: connac: do not check WED status for non-mmio devices","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53086.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53086","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21049","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20997","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20965","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20835","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20702","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20776","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20864","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20859","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53086"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363740","reference_id":"2363740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53086"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7uu6-ytsy-buh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67503?format=json","vulnerability_id":"VCID-7vst-mvv6-dudd","summary":"kernel: ALSA: hda: Fix Oops by 9.1 surround channel names","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53400.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53400","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02489","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02543","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a","reference_id":"082dcd51667b29097500c824c37f24da997a6a8a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396390","reference_id":"2396390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396390"},{"reference_url":"https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6","reference_id":"3b44ec8c5c44790a82f07e90db45643c762878c6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6"},{"reference_url":"https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4","reference_id":"4ef155ddf9578bf035964d58739fdcd7dd44b4a4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4"},{"reference_url":"https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825","reference_id":"546b1f5f45a355ae0d3a8041cdaca597dfcac825","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825"},{"reference_url":"https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6","reference_id":"b5694aae4c2d9a288bafce7d38f122769e0428e6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6"},{"reference_url":"https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e","reference_id":"dc8c569d59f17b17d7bca4f68c36bd571659921e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e"},{"reference_url":"https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8","reference_id":"e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8"},{"reference_url":"https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634","reference_id":"fcf637461019e9a5a0c12fc5c42a9db1779b0634","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:23Z/"}],"url":"https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53400"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vst-mvv6-dudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78720?format=json","vulnerability_id":"VCID-86j6-rxsj-jucj","summary":"kernel: sctp: fail if no bound addresses can be used for a given scope","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1074","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01973","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01999","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02004","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02428","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02421","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/23/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/23/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430","reference_id":"2173430","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/4"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f","reference_id":"?id=458e279f861d3f61796894cd158b780765a1569f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0723","reference_id":"RHSA-2024:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0725","reference_id":"RHSA-2024:0725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"},{"reference_url":"https://usn.ubuntu.com/6032-1/","reference_id":"USN-6032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6032-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1074"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67965?format=json","vulnerability_id":"VCID-8d7p-7myd-1uac","summary":"kernel: xfrm: add NULL check in xfrm_update_ae_params","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53147.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53147","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395408","reference_id":"2395408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"}],"fixed_packages":[],"aliases":["CVE-2023-53147"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8d7p-7myd-1uac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69802?format=json","vulnerability_id":"VCID-8hx5-vau1-ybfp","summary":"kernel: drm/edid: fix info leak when failing to get panel id","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53085.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53085","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22823","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22906","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22983","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2295","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22967","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363692","reference_id":"2363692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363692"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53085"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hx5-vau1-ybfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65609?format=json","vulnerability_id":"VCID-8m29-81p9-afeb","summary":"kernel: wifi: ath10k: Delay the unmapping of the buffer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50700.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50700","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424994","reference_id":"2424994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50700"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m29-81p9-afeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70743?format=json","vulnerability_id":"VCID-8pzc-193c-ffbn","summary":"kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52977.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52977","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02361","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0237","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02365","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06975","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0701","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30","reference_id":"0c598aed445eb45b0ee7ba405f7ece99ee349c30","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30"},{"reference_url":"https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee","reference_id":"1ac653cf886cdfc082708c82dc6ac6115cebd2ee","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355538","reference_id":"2355538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355538"},{"reference_url":"https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d","reference_id":"70154489f531587996f3e9d7cceeee65cff0001d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d"},{"reference_url":"https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b","reference_id":"70d40674a549d498bd63d5432acf46205da1534b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b"},{"reference_url":"https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386","reference_id":"af4e720bc00a2653f7b9df21755b9978b3d7f386","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386"},{"reference_url":"https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb","reference_id":"ed6c5e8caf55778500202775167e8ccdb1a030cb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb"},{"reference_url":"https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf","reference_id":"f423c2efd51d7eb1d143c2be7eea233241d9bbbf","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:21:57Z/"}],"url":"https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52977"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pzc-193c-ffbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78529?format=json","vulnerability_id":"VCID-8uzn-q3h8-8qfs","summary":"kernel: KVM: nVMX: missing consistency checks for CR0 and CR4","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30456","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01544","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01547","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01911","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01901","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03318","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03297","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5","reference_id":"112e66017bff7f2837030f34c2bc19501e9212d5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468","reference_id":"2188468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8","reference_id":"ChangeLog-6.2.8","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8"},{"reference_url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230511-0007/","reference_id":"ntap-20230511-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230511-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6123-1/","reference_id":"USN-6123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6123-1/"},{"reference_url":"https://usn.ubuntu.com/6124-1/","reference_id":"USN-6124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6124-1/"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6699-1/","reference_id":"USN-6699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6699-1/"}],"fixed_packages":[],"aliases":["CVE-2023-30456"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69898?format=json","vulnerability_id":"VCID-8xhu-u2bd-nqfz","summary":"kernel: drm/ttm: Fix a NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53095.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53095","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53095"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363792","reference_id":"2363792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53095"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xhu-u2bd-nqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67859?format=json","vulnerability_id":"VCID-9932-jg75-m3ga","summary":"kernel: wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50279.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50279","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04156","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50279"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395294","reference_id":"2395294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50279"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9932-jg75-m3ga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67334?format=json","vulnerability_id":"VCID-9h4t-239c-73hy","summary":"kernel: drm/radeon: free iio for atombios when driver shutdown","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53453.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53453.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53453","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53453"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400769","reference_id":"2400769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53453"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9h4t-239c-73hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67885?format=json","vulnerability_id":"VCID-9mqz-3u9x-ybfg","summary":"kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53232.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53232","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01595","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01586","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01584","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01579","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01503","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53232"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395322","reference_id":"2395322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"}],"fixed_packages":[],"aliases":["CVE-2023-53232"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9mqz-3u9x-ybfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70654?format=json","vulnerability_id":"VCID-9nqp-u6mk-9ycj","summary":"kernel: Revert \"wifi: mac80211: fix memory leak in ieee80211_if_add()\"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53028.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53028","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07463","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07395","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07447","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355440","reference_id":"2355440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355440"},{"reference_url":"https://git.kernel.org/stable/c/71e5cd1018d345e649e63f74a56c1897f99db7e9","reference_id":"71e5cd1018d345e649e63f74a56c1897f99db7e9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"}],"url":"https://git.kernel.org/stable/c/71e5cd1018d345e649e63f74a56c1897f99db7e9"},{"reference_url":"https://git.kernel.org/stable/c/80f8a66dede0a4b4e9e846765a97809c6fe49ce5","reference_id":"80f8a66dede0a4b4e9e846765a97809c6fe49ce5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"}],"url":"https://git.kernel.org/stable/c/80f8a66dede0a4b4e9e846765a97809c6fe49ce5"},{"reference_url":"https://git.kernel.org/stable/c/982c8b1e95c088f5d8f65967ec25be66e961401c","reference_id":"982c8b1e95c088f5d8f65967ec25be66e961401c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"}],"url":"https://git.kernel.org/stable/c/982c8b1e95c088f5d8f65967ec25be66e961401c"},{"reference_url":"https://git.kernel.org/stable/c/effecd8d116d3d3a28b4f628e61bba8d318fdfcf","reference_id":"effecd8d116d3d3a28b4f628e61bba8d318fdfcf","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:24Z/"}],"url":"https://git.kernel.org/stable/c/effecd8d116d3d3a28b4f628e61bba8d318fdfcf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53028"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nqp-u6mk-9ycj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65395?format=json","vulnerability_id":"VCID-9spm-xnwf-qqfr","summary":"kernel: drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50844.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50844","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426172","reference_id":"2426172","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50844"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9spm-xnwf-qqfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69817?format=json","vulnerability_id":"VCID-9vwp-x5e6-5qdn","summary":"kernel: scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53078.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53078","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19307","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19444","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363707","reference_id":"2363707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53078"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9vwp-x5e6-5qdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67574?format=json","vulnerability_id":"VCID-9wmm-kn83-5kcy","summary":"kernel: blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53421.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53421","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06208","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06194","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07574","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0737","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07363","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07357","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07556","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08437","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08189","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0561aa6033dd181594116d705c41fc16e97161a2","reference_id":"0561aa6033dd181594116d705c41fc16e97161a2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/"}],"url":"https://git.kernel.org/stable/c/0561aa6033dd181594116d705c41fc16e97161a2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396500","reference_id":"2396500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396500"},{"reference_url":"https://git.kernel.org/stable/c/3d2af77e31ade05ff7ccc3658c3635ec1bea0979","reference_id":"3d2af77e31ade05ff7ccc3658c3635ec1bea0979","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/"}],"url":"https://git.kernel.org/stable/c/3d2af77e31ade05ff7ccc3658c3635ec1bea0979"},{"reference_url":"https://git.kernel.org/stable/c/892faa76be894d324bf48b12a55c7af7be2bad83","reference_id":"892faa76be894d324bf48b12a55c7af7be2bad83","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/"}],"url":"https://git.kernel.org/stable/c/892faa76be894d324bf48b12a55c7af7be2bad83"},{"reference_url":"https://git.kernel.org/stable/c/abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2","reference_id":"abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/"}],"url":"https://git.kernel.org/stable/c/abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2"},{"reference_url":"https://git.kernel.org/stable/c/b0d26283af612b9e0cc3188b0b88ad7fdea447e8","reference_id":"b0d26283af612b9e0cc3188b0b88ad7fdea447e8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/"}],"url":"https://git.kernel.org/stable/c/b0d26283af612b9e0cc3188b0b88ad7fdea447e8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://usn.ubuntu.com/8162-1/","reference_id":"USN-8162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8162-1/"},{"reference_url":"https://usn.ubuntu.com/8180-1/","reference_id":"USN-8180-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-1/"},{"reference_url":"https://usn.ubuntu.com/8180-2/","reference_id":"USN-8180-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-2/"},{"reference_url":"https://usn.ubuntu.com/8180-3/","reference_id":"USN-8180-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-3/"},{"reference_url":"https://usn.ubuntu.com/8180-4/","reference_id":"USN-8180-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-4/"},{"reference_url":"https://usn.ubuntu.com/8180-5/","reference_id":"USN-8180-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-5/"},{"reference_url":"https://usn.ubuntu.com/8180-6/","reference_id":"USN-8180-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8180-6/"},{"reference_url":"https://usn.ubuntu.com/8186-1/","reference_id":"USN-8186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8186-1/"},{"reference_url":"https://usn.ubuntu.com/8187-1/","reference_id":"USN-8187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8187-1/"},{"reference_url":"https://usn.ubuntu.com/8188-1/","reference_id":"USN-8188-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8188-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"}],"fixed_packages":[],"aliases":["CVE-2023-53421"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wmm-kn83-5kcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69881?format=json","vulnerability_id":"VCID-9wns-7t95-afcb","summary":"kernel: wifi: mt76: do not run mt76_unregister_device() on unregistered hw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53071.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53071","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53071"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363775","reference_id":"2363775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53071"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wns-7t95-afcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67974?format=json","vulnerability_id":"VCID-9yvr-y46y-6fff","summary":"kernel: wifi: mac80211: fix memory leak in ieee80211_if_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50290.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50290.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395417","reference_id":"2395417","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50290"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yvr-y46y-6fff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65479?format=json","vulnerability_id":"VCID-a1gt-m5ms-8ucg","summary":"kernel: wifi: fix potential NULL-ptr deref after clone","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50784.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50784","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426259","reference_id":"2426259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50784"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1gt-m5ms-8ucg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78458?format=json","vulnerability_id":"VCID-a2u7-uepg-jfa1","summary":"kernel: gfs2: NULL pointer dereference in gfs2_evict_inode()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3212","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01727","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01705","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02117","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348","reference_id":"2214348","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6339-1/","reference_id":"USN-6339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-1/"},{"reference_url":"https://usn.ubuntu.com/6339-2/","reference_id":"USN-6339-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-2/"},{"reference_url":"https://usn.ubuntu.com/6339-3/","reference_id":"USN-6339-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-3/"},{"reference_url":"https://usn.ubuntu.com/6339-4/","reference_id":"USN-6339-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-4/"},{"reference_url":"https://usn.ubuntu.com/6350-1/","reference_id":"USN-6350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6350-1/"},{"reference_url":"https://usn.ubuntu.com/6351-1/","reference_id":"USN-6351-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6351-1/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6417-1/","reference_id":"USN-6417-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6417-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3212"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2u7-uepg-jfa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65393?format=json","vulnerability_id":"VCID-a5e3-hqkq-63h3","summary":"kernel: drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50847.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50847","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50847"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426170","reference_id":"2426170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50847"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5e3-hqkq-63h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78560?format=json","vulnerability_id":"VCID-a5jg-3sk6-eqhw","summary":"kernel: tun: avoid double free in tun_free_netdev","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4744","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26806","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2673","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26748","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26758","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322","reference_id":"2156322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322"},{"reference_url":"http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html","reference_id":"CentOS-Stream-9-Missing-Kernel-Security-Fix.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e","reference_id":"?id=158b515f703e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230526-0009/","reference_id":"ntap-20230526-0009","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230526-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1466","reference_id":"RHSA-2023:1466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1467","reference_id":"RHSA-2023:1467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1468","reference_id":"RHSA-2023:1468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1469","reference_id":"RHSA-2023:1469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1470","reference_id":"RHSA-2023:1470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1471","reference_id":"RHSA-2023:1471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"}],"fixed_packages":[],"aliases":["CVE-2022-4744"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5jg-3sk6-eqhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65750?format=json","vulnerability_id":"VCID-a6zq-5g9d-x7cg","summary":"kernel: drm/amdkfd: Fix kernel warning during topology setup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54144.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54144","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54144"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425138","reference_id":"2425138","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54144"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6zq-5g9d-x7cg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67155?format=json","vulnerability_id":"VCID-a7yt-qx7y-xfas","summary":"kernel: ALSA: ymfpci: Fix BUG_ON in probe function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53607.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53607","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02035","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02045","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02955","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02885","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02906","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53607"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401517","reference_id":"2401517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53607"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a7yt-qx7y-xfas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72196?format=json","vulnerability_id":"VCID-a97s-ex9t-rkc3","summary":"kernel: drm/dp_mst: Fix resetting msg rx state after topology removal","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57876.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-57876","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06528","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06634","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06778","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06848","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06866","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-57876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337142","reference_id":"2337142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8248","reference_id":"RHSA-2025:8248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8248"},{"reference_url":"https://usn.ubuntu.com/7379-1/","reference_id":"USN-7379-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7379-1/"},{"reference_url":"https://usn.ubuntu.com/7379-2/","reference_id":"USN-7379-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7379-2/"},{"reference_url":"https://usn.ubuntu.com/7380-1/","reference_id":"USN-7380-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7380-1/"},{"reference_url":"https://usn.ubuntu.com/7381-1/","reference_id":"USN-7381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7381-1/"},{"reference_url":"https://usn.ubuntu.com/7382-1/","reference_id":"USN-7382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7382-1/"},{"reference_url":"https://usn.ubuntu.com/7449-1/","reference_id":"USN-7449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-1/"},{"reference_url":"https://usn.ubuntu.com/7449-2/","reference_id":"USN-7449-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-2/"},{"reference_url":"https://usn.ubuntu.com/7450-1/","reference_id":"USN-7450-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7450-1/"},{"reference_url":"https://usn.ubuntu.com/7451-1/","reference_id":"USN-7451-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7451-1/"},{"reference_url":"https://usn.ubuntu.com/7452-1/","reference_id":"USN-7452-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7452-1/"},{"reference_url":"https://usn.ubuntu.com/7453-1/","reference_id":"USN-7453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7453-1/"},{"reference_url":"https://usn.ubuntu.com/7468-1/","reference_id":"USN-7468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7468-1/"},{"reference_url":"https://usn.ubuntu.com/7523-1/","reference_id":"USN-7523-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7523-1/"},{"reference_url":"https://usn.ubuntu.com/7524-1/","reference_id":"USN-7524-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7524-1/"}],"fixed_packages":[],"aliases":["CVE-2024-57876"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a97s-ex9t-rkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70692?format=json","vulnerability_id":"VCID-aeej-ry8s-7qf6","summary":"kernel: net/sched: sch_taprio: fix possible use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53021.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53021","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1021","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11703","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1169","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11661","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14071","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53021"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1200388a0b1c3c6fda48d4d2143db8f7e4ef5348","reference_id":"1200388a0b1c3c6fda48d4d2143db8f7e4ef5348","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T17:01:12Z/"}],"url":"https://git.kernel.org/stable/c/1200388a0b1c3c6fda48d4d2143db8f7e4ef5348"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355484","reference_id":"2355484","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355484"},{"reference_url":"https://git.kernel.org/stable/c/3a415d59c1dbec9d772dbfab2d2520d98360caae","reference_id":"3a415d59c1dbec9d772dbfab2d2520d98360caae","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T17:01:12Z/"}],"url":"https://git.kernel.org/stable/c/3a415d59c1dbec9d772dbfab2d2520d98360caae"},{"reference_url":"https://git.kernel.org/stable/c/c53acbf2facfdfabdc6e6984a1a38f5d38b606a1","reference_id":"c53acbf2facfdfabdc6e6984a1a38f5d38b606a1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T17:01:12Z/"}],"url":"https://git.kernel.org/stable/c/c53acbf2facfdfabdc6e6984a1a38f5d38b606a1"},{"reference_url":"https://git.kernel.org/stable/c/c60fe70078d6e515f424cb868d07e00411b27fbc","reference_id":"c60fe70078d6e515f424cb868d07e00411b27fbc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T17:01:12Z/"}],"url":"https://git.kernel.org/stable/c/c60fe70078d6e515f424cb868d07e00411b27fbc"},{"reference_url":"https://git.kernel.org/stable/c/d3b2d2820a005e43855fa71b80c4a4b194201c60","reference_id":"d3b2d2820a005e43855fa71b80c4a4b194201c60","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T17:01:12Z/"}],"url":"https://git.kernel.org/stable/c/d3b2d2820a005e43855fa71b80c4a4b194201c60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53021"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aeej-ry8s-7qf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65374?format=json","vulnerability_id":"VCID-afwb-6d63-qbbq","summary":"kernel: drm/virtio: Check whether transferred 2D BO is shmem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50842.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50842","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426151","reference_id":"2426151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50842"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afwb-6d63-qbbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78110?format=json","vulnerability_id":"VCID-amu6-u9vr-x3gf","summary":"kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4732","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02263","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02371","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02366","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02362","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236982","reference_id":"2236982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"}],"fixed_packages":[],"aliases":["CVE-2023-4732"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amu6-u9vr-x3gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67017?format=json","vulnerability_id":"VCID-an95-d2f9-wkbc","summary":"kernel: md: fix soft lockup in status_resync","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53620.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53620","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01003","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01064","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01221","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01218","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01214","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01211","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402268","reference_id":"2402268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2023-53620"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-an95-d2f9-wkbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66121?format=json","vulnerability_id":"VCID-apj2-9k7k-tbgq","summary":"kernel: drm/amd/display: fix FCLK pstate change underflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53780.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53780","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53780"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420287","reference_id":"2420287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53780"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apj2-9k7k-tbgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69859?format=json","vulnerability_id":"VCID-aq8d-xzc4-uqbf","summary":"kernel: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53077.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53077","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19816","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19662","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19746","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19709","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19737","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363752","reference_id":"2363752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53077"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq8d-xzc4-uqbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65348?format=json","vulnerability_id":"VCID-aze6-wgfm-3ycv","summary":"kernel: ASoC: SOF: avoid a NULL dereference with unsupported widgets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54233.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54233","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10551","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426124","reference_id":"2426124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54233"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aze6-wgfm-3ycv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67871?format=json","vulnerability_id":"VCID-b2k9-sds1-zkcv","summary":"kernel: nfsd: call op_release, even when op_func returns an error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53241.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53241","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03977","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810","reference_id":"15a8b55dbb1ba154d82627547c5761cac884d810","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"}],"url":"https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395306","reference_id":"2395306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395306"},{"reference_url":"https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae","reference_id":"3d0dcada384af22dec764c8374a2997870ec86ae","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"}],"url":"https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae"},{"reference_url":"https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570","reference_id":"65a33135e91e6dd661ecdf1194b9d90c49ae3570","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"}],"url":"https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570"},{"reference_url":"https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3","reference_id":"b11d8162c24af4a351d21e2c804d25ca493305e3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"}],"url":"https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3"},{"reference_url":"https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3","reference_id":"b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:52Z/"}],"url":"https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53241"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k9-sds1-zkcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67044?format=json","vulnerability_id":"VCID-b8wn-e4jg-gyap","summary":"kernel: net/sched: sch_fq: fix integer overflow of \"credit\"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53624.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53624","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402296","reference_id":"2402296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53624"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8wn-e4jg-gyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78257?format=json","vulnerability_id":"VCID-bdv6-qrn1-aqhv","summary":"kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3611","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02832","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02643","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02754","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02772","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02824","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02831","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225191","reference_id":"2225191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225191"},{"reference_url":"https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_id":"3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_id":"?id=3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230908-0002/","reference_id":"ntap-20230908-0002","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230908-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1377","reference_id":"RHSA-2024:1377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1831","reference_id":"RHSA-2024:1831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1831"},{"reference_url":"https://usn.ubuntu.com/6285-1/","reference_id":"USN-6285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6285-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6341-1/","reference_id":"USN-6341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6341-1/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3611"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdv6-qrn1-aqhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67521?format=json","vulnerability_id":"VCID-bmrw-zmsg-d3gw","summary":"kernel: nvme: fix multipath crash caused by flush request when blktrace is enabled","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50388.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50388","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50388"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/183c2aaef40a91acbaae45c3824d6cde7bb62b10","reference_id":"183c2aaef40a91acbaae45c3824d6cde7bb62b10","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:41Z/"}],"url":"https://git.kernel.org/stable/c/183c2aaef40a91acbaae45c3824d6cde7bb62b10"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396411","reference_id":"2396411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396411"},{"reference_url":"https://git.kernel.org/stable/c/3659fb5ac29a5e6102bebe494ac789fd47fb78f4","reference_id":"3659fb5ac29a5e6102bebe494ac789fd47fb78f4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:41Z/"}],"url":"https://git.kernel.org/stable/c/3659fb5ac29a5e6102bebe494ac789fd47fb78f4"},{"reference_url":"https://git.kernel.org/stable/c/4df413d46960f11c8c105238cfc3f5ff4c95c003","reference_id":"4df413d46960f11c8c105238cfc3f5ff4c95c003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:41Z/"}],"url":"https://git.kernel.org/stable/c/4df413d46960f11c8c105238cfc3f5ff4c95c003"},{"reference_url":"https://git.kernel.org/stable/c/f13301a69ababa6c2236fb4f0393b7e914e7e1e0","reference_id":"f13301a69ababa6c2236fb4f0393b7e914e7e1e0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:41Z/"}],"url":"https://git.kernel.org/stable/c/f13301a69ababa6c2236fb4f0393b7e914e7e1e0"},{"reference_url":"https://git.kernel.org/stable/c/fcd2d199486033223e9b2a6a7f9a01dd0327eac3","reference_id":"fcd2d199486033223e9b2a6a7f9a01dd0327eac3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:49:41Z/"}],"url":"https://git.kernel.org/stable/c/fcd2d199486033223e9b2a6a7f9a01dd0327eac3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50388"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bmrw-zmsg-d3gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66270?format=json","vulnerability_id":"VCID-bq3e-15cq-u3f5","summary":"kernel: drm/gud: Fix UBSAN warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50628.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50628","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50628"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419904","reference_id":"2419904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50628"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bq3e-15cq-u3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65646?format=json","vulnerability_id":"VCID-brev-vkyg-g7ev","summary":"kernel: Linux kernel: Memory leak in RDMA/irdma subsystem leads to Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54055.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54055","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54055"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425033","reference_id":"2425033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54055"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brev-vkyg-g7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78966?format=json","vulnerability_id":"VCID-brwq-qcbd-c3ep","summary":"kernel: x86/mm: Randomize per-cpu entry area","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0597","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0533","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05239","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05278","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05321","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05237","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/28/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/07/28/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926","reference_id":"2165926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926"},{"reference_url":"https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80","reference_id":"97e3d26b5e5f371b3ee223d94dd123e6c442ba80","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"}],"url":"https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10262","reference_id":"RHSA-2024:10262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10772","reference_id":"RHSA-2024:10772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10773","reference_id":"RHSA-2024:10773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://usn.ubuntu.com/6206-1/","reference_id":"USN-6206-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6206-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"}],"fixed_packages":[],"aliases":["CVE-2023-0597"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brwq-qcbd-c3ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70713?format=json","vulnerability_id":"VCID-bu5s-venv-j3dw","summary":"kernel: bnxt: Do not read past the end of test names","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53010.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53010","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0455","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04513","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04548","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25104","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29099","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53010"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355506","reference_id":"2355506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53010"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bu5s-venv-j3dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69837?format=json","vulnerability_id":"VCID-bvh6-bz52-sfcb","summary":"kernel: scsi: qla2xxx: Synchronize the IOCB count to be in order","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53056.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53056","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19916","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20003","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19973","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19997","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53056"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363729","reference_id":"2363729","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53056"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvh6-bz52-sfcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71481?format=json","vulnerability_id":"VCID-c1sh-n99u-dqbn","summary":"kernel: SUNRPC: Trap RDMA segment overflows","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49356.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49356","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3291","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32924","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32719","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32445","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32455","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32357","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32379","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32916","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348053","reference_id":"2348053","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49356"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1sh-n99u-dqbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66977?format=json","vulnerability_id":"VCID-c2bu-ants-67be","summary":"kernel: tipc: fix a null-ptr-deref in tipc_topsrv_accept","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50555.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50555","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50555"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402227","reference_id":"2402227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50555"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2bu-ants-67be"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79345?format=json","vulnerability_id":"VCID-c3z5-1arv-kqck","summary":"kernel: ext4: use-after-free in ext4_xattr_set_entry()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02134","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02935","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02931","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02897","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/","reference_id":"20220616021358.2504451-1-libaokun1%40huawei.com","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097","reference_id":"2193097","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"reference_url":"https://github.com/torvalds/linux/commit/67d7d8ad99be","reference_id":"67d7d8ad99be","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://github.com/torvalds/linux/commit/67d7d8ad99be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15649","reference_id":"RHSA-2025:15649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15656","reference_id":"RHSA-2025:15656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15660","reference_id":"RHSA-2025:15660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2513"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65366?format=json","vulnerability_id":"VCID-c4uq-rfmc-fugt","summary":"kernel: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50819.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50819","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426143","reference_id":"2426143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50819"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4uq-rfmc-fugt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67969?format=json","vulnerability_id":"VCID-c55k-x8eu-r3ay","summary":"kernel: wifi: ath9k: verify the expected usb_endpoints are present","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50297.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50297.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50297","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50297"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395412","reference_id":"2395412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50297"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c55k-x8eu-r3ay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70125?format=json","vulnerability_id":"VCID-c8ad-ma5z-yqad","summary":"kernel: drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49864.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49864","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12808","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12672","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12716","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12787","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12781","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12782","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12795","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363495","reference_id":"2363495","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363495"},{"reference_url":"https://git.kernel.org/stable/c/3c1bb6187e566143f15dbf0367ae671584aead5b","reference_id":"3c1bb6187e566143f15dbf0367ae671584aead5b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"}],"url":"https://git.kernel.org/stable/c/3c1bb6187e566143f15dbf0367ae671584aead5b"},{"reference_url":"https://git.kernel.org/stable/c/5b994354af3cab770bf13386469c5725713679af","reference_id":"5b994354af3cab770bf13386469c5725713679af","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"}],"url":"https://git.kernel.org/stable/c/5b994354af3cab770bf13386469c5725713679af"},{"reference_url":"https://git.kernel.org/stable/c/613d5a9a440828970f1543b962779401ac2c9c62","reference_id":"613d5a9a440828970f1543b962779401ac2c9c62","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:05:17Z/"}],"url":"https://git.kernel.org/stable/c/613d5a9a440828970f1543b962779401ac2c9c62"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49864"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c8ad-ma5z-yqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67999?format=json","vulnerability_id":"VCID-cadg-9afp-afee","summary":"kernel: usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50246.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50246.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50246","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50246"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50246","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50246"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395442","reference_id":"2395442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50246"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cadg-9afp-afee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78214?format=json","vulnerability_id":"VCID-cf2b-yvwj-wyh1","summary":"kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4155","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02073","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0207","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02089","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0209","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02064","published_at":"2026-05-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00715","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00705","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00713","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0071","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00714","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4155"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802","reference_id":"2213802","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4155","reference_id":"CVE-2023-4155","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3859","reference_id":"RHSA-2024:3859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4155"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2b-yvwj-wyh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69276?format=json","vulnerability_id":"VCID-cghg-192k-u7df","summary":"kernel: writeback: avoid use-after-free after removing device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49995.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49995","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16087","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1612","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16012","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49995"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373560","reference_id":"2373560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12525","reference_id":"RHSA-2025:12525","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12525"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12526","reference_id":"RHSA-2025:12526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12526"}],"fixed_packages":[],"aliases":["CVE-2022-49995"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cghg-192k-u7df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66770?format=json","vulnerability_id":"VCID-chgj-ebyf-gqfs","summary":"kernel: Linux kernel: Memory leak in __class_register()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50578.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50578","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16907","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16747","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16468","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16693","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16695","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50578"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405724","reference_id":"2405724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50578"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chgj-ebyf-gqfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67973?format=json","vulnerability_id":"VCID-cm4u-6g3p-3ufh","summary":"kernel: net: openvswitch: fix race on port output","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53188.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53188","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02225","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02223","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02209","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02144","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395416","reference_id":"2395416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395416"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53188"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cm4u-6g3p-3ufh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66273?format=json","vulnerability_id":"VCID-dbp3-snpt-bfh9","summary":"kernel: wifi: ath11k: fix monitor mode bringup crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50627.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50627","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50627"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419908","reference_id":"2419908","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50627"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dbp3-snpt-bfh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70088?format=json","vulnerability_id":"VCID-dh6v-w57q-8yhg","summary":"kernel: tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49862.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49862","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19307","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19444","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49862"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/082707d3df191bf5bb8801d43e4ce3dea39ca173","reference_id":"082707d3df191bf5bb8801d43e4ce3dea39ca173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/082707d3df191bf5bb8801d43e4ce3dea39ca173"},{"reference_url":"https://git.kernel.org/stable/c/1c075b192fe41030457cd4a5f7dea730412bca40","reference_id":"1c075b192fe41030457cd4a5f7dea730412bca40","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/1c075b192fe41030457cd4a5f7dea730412bca40"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363458","reference_id":"2363458","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363458"},{"reference_url":"https://git.kernel.org/stable/c/301caa06091af4d5cf056ac8249cbda4e6029c6a","reference_id":"301caa06091af4d5cf056ac8249cbda4e6029c6a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/301caa06091af4d5cf056ac8249cbda4e6029c6a"},{"reference_url":"https://git.kernel.org/stable/c/36769b9477491a7af6635863bd950309c1e1b96c","reference_id":"36769b9477491a7af6635863bd950309c1e1b96c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/36769b9477491a7af6635863bd950309c1e1b96c"},{"reference_url":"https://git.kernel.org/stable/c/55a253a6753a603e80b95932ca971ba514aa6ce7","reference_id":"55a253a6753a603e80b95932ca971ba514aa6ce7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/55a253a6753a603e80b95932ca971ba514aa6ce7"},{"reference_url":"https://git.kernel.org/stable/c/6cee2c60bd168279852ac7dbe54c2b70d1028644","reference_id":"6cee2c60bd168279852ac7dbe54c2b70d1028644","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/6cee2c60bd168279852ac7dbe54c2b70d1028644"},{"reference_url":"https://git.kernel.org/stable/c/a0ead1d648df9c456baec832b494513ef405949a","reference_id":"a0ead1d648df9c456baec832b494513ef405949a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/a0ead1d648df9c456baec832b494513ef405949a"},{"reference_url":"https://git.kernel.org/stable/c/f31dd158580940938f77514b87337a777520185a","reference_id":"f31dd158580940938f77514b87337a777520185a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:11:41Z/"}],"url":"https://git.kernel.org/stable/c/f31dd158580940938f77514b87337a777520185a"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49862"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dh6v-w57q-8yhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65406?format=json","vulnerability_id":"VCID-djnk-z5ny-97hm","summary":"kernel: media: uvcvideo: Fix memory leak in uvc_gpio_parse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50882.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50882","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50882"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426184","reference_id":"2426184","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50882"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-djnk-z5ny-97hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67835?format=json","vulnerability_id":"VCID-dkpb-6kwe-j7b1","summary":"kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53213.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53213","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0224","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02224","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02254","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0da40e018fd034d87c9460123fa7f897b69fdee7","reference_id":"0da40e018fd034d87c9460123fa7f897b69fdee7","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/0da40e018fd034d87c9460123fa7f897b69fdee7"},{"reference_url":"https://git.kernel.org/stable/c/21bee3e649d87f78fe8aef6ae02edd3d6f310fd0","reference_id":"21bee3e649d87f78fe8aef6ae02edd3d6f310fd0","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/21bee3e649d87f78fe8aef6ae02edd3d6f310fd0"},{"reference_url":"https://git.kernel.org/stable/c/228186629ea970cc78b7d7d5f593f2d32fddf9f6","reference_id":"228186629ea970cc78b7d7d5f593f2d32fddf9f6","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/228186629ea970cc78b7d7d5f593f2d32fddf9f6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395267","reference_id":"2395267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395267"},{"reference_url":"https://git.kernel.org/stable/c/39f9bd880abac6068bedb24a4e16e7bd26bf92da","reference_id":"39f9bd880abac6068bedb24a4e16e7bd26bf92da","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/39f9bd880abac6068bedb24a4e16e7bd26bf92da"},{"reference_url":"https://git.kernel.org/stable/c/425eea395f1f5ae349fb55f7fe51d833a5324bfe","reference_id":"425eea395f1f5ae349fb55f7fe51d833a5324bfe","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/425eea395f1f5ae349fb55f7fe51d833a5324bfe"},{"reference_url":"https://git.kernel.org/stable/c/549825602e3e6449927ca1ea1a08fd89868439df","reference_id":"549825602e3e6449927ca1ea1a08fd89868439df","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/549825602e3e6449927ca1ea1a08fd89868439df"},{"reference_url":"https://git.kernel.org/stable/c/936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8","reference_id":"936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8"},{"reference_url":"https://git.kernel.org/stable/c/ac5305e5d227b9af3aae25fa83380d3ff0225b73","reference_id":"ac5305e5d227b9af3aae25fa83380d3ff0225b73","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/ac5305e5d227b9af3aae25fa83380d3ff0225b73"},{"reference_url":"https://git.kernel.org/stable/c/e29661611e6e71027159a3140e818ef3b99f32dd","reference_id":"e29661611e6e71027159a3140e818ef3b99f32dd","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:48Z/"}],"url":"https://git.kernel.org/stable/c/e29661611e6e71027159a3140e818ef3b99f32dd"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"}],"fixed_packages":[],"aliases":["CVE-2023-53213"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkpb-6kwe-j7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67116?format=json","vulnerability_id":"VCID-dm3r-us9z-5uc3","summary":"kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53556","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401478","reference_id":"2401478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5069","reference_id":"RHSA-2023:5069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53556"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dm3r-us9z-5uc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67175?format=json","vulnerability_id":"VCID-dpah-3hkx-rbbu","summary":"kernel: drm/amd: fix potential memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50479.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50479","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05593","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401537","reference_id":"2401537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50479"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dpah-3hkx-rbbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65362?format=json","vulnerability_id":"VCID-e227-daq9-ufa8","summary":"kernel: driver core: fix potential null-ptr-deref in device_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54321.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54321.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54321","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07027","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07056","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09524","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09594","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09575","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426138","reference_id":"2426138","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54321"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e227-daq9-ufa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66969?format=json","vulnerability_id":"VCID-e5jb-59g6-zbdm","summary":"kernel: drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50520.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50520","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50520"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402219","reference_id":"2402219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50520"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5jb-59g6-zbdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78602?format=json","vulnerability_id":"VCID-ebxk-u1b1-zybq","summary":"kernel: use-after-free bug in remove function xgene_hwmon_remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1855","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02655","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03999","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04034","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04044","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/","reference_id":"20230318122758.2140868-1-linux%40roeck-us.net","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578","reference_id":"2184578","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578"},{"reference_url":"https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1","reference_id":"cb090e64cf25602b9adaf32d5dfc9c8bec493cd1","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1855"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebxk-u1b1-zybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67190?format=json","vulnerability_id":"VCID-etbt-qgzf-8yff","summary":"kernel: HID: hyperv: avoid struct memcpy overrun warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53553.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53553","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05593","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401552","reference_id":"2401552","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-53553"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-etbt-qgzf-8yff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70714?format=json","vulnerability_id":"VCID-f736-29kd-63g7","summary":"kernel: ptdma: pt_core_execute_cmd() should use spinlock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53013.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53013","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10166","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10083","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10152","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10126","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11404","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1127","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24482","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53013"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/13ba563c2c8055ba8a637c9f70bb833b43cb4207","reference_id":"13ba563c2c8055ba8a637c9f70bb833b43cb4207","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"}],"url":"https://git.kernel.org/stable/c/13ba563c2c8055ba8a637c9f70bb833b43cb4207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355508","reference_id":"2355508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355508"},{"reference_url":"https://git.kernel.org/stable/c/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c","reference_id":"95e5fda3b5f9ed8239b145da3fa01e641cf5d53c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"}],"url":"https://git.kernel.org/stable/c/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c"},{"reference_url":"https://git.kernel.org/stable/c/ed0d8f731e0bf1bb12a7a37698ac613db20e2794","reference_id":"ed0d8f731e0bf1bb12a7a37698ac613db20e2794","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:41Z/"}],"url":"https://git.kernel.org/stable/c/ed0d8f731e0bf1bb12a7a37698ac613db20e2794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53013"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f736-29kd-63g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65286?format=json","vulnerability_id":"VCID-fah9-g62s-s3h1","summary":"kernel: crypto: qat - fix out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54325","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426061","reference_id":"2426061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3349","reference_id":"RHSA-2023:3349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54325"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fah9-g62s-s3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65254?format=json","vulnerability_id":"VCID-fb7m-jaf7-tugv","summary":"kernel: Linux kernel xHCI DbC: Denial of Service via memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50809.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50809","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50809"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426028","reference_id":"2426028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50809"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fb7m-jaf7-tugv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66289?format=json","vulnerability_id":"VCID-fcez-uey6-aydd","summary":"kernel: Linux kernel: Denial of Service via memory leak in ath12k Wi-Fi driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53767.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53767","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06396","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06373","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06387","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10572","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53767"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419934","reference_id":"2419934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53767"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcez-uey6-aydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79923?format=json","vulnerability_id":"VCID-fk99-ervq-v3fx","summary":"kernel: ovl: fix use after free in struct ovl_aio_req","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1252","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05154","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06249","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06465","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06476","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06095","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06055","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140","reference_id":"2176140","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8107","reference_id":"RHSA-2024:8107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8613","reference_id":"RHSA-2024:8613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8614","reference_id":"RHSA-2024:8614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8614"}],"fixed_packages":[],"aliases":["CVE-2023-1252"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fk99-ervq-v3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67203?format=json","vulnerability_id":"VCID-fkss-ns84-qkbe","summary":"kernel: xhci: Remove device endpoints from bandwidth list when freeing the device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50470.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50470.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50470","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50470"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401565","reference_id":"2401565","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50470"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkss-ns84-qkbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69324?format=json","vulnerability_id":"VCID-fstk-hcn8-3bc5","summary":"kernel: Revert \"usb: typec: ucsi: add a common function ucsi_unregister_connectors()\"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49944.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49944","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22065","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22145","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22113","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22136","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.21987","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49944"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373608","reference_id":"2373608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0951","reference_id":"RHSA-2023:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49944"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fstk-hcn8-3bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67097?format=json","vulnerability_id":"VCID-funv-d48z-63bz","summary":"kernel: net/mlx5e: Fix deadlock in tc route query code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53591.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53591","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01673","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02577","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02542","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02579","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02574","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53591"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401459","reference_id":"2401459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53591"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-funv-d48z-63bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77792?format=json","vulnerability_id":"VCID-g6yc-cmf7-kbhf","summary":"kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51043","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02519","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02515","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02434","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005","reference_id":"2260005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005"},{"reference_url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255","reference_id":"4e076c73e4f6e90816b30fcd4a0d7ab365087255","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/"}],"url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5","reference_id":"ChangeLog-6.4.5","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-51043"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g6yc-cmf7-kbhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66274?format=json","vulnerability_id":"VCID-gdf7-z8wt-zqae","summary":"kernel: virt/coco/sev-guest: Double-buffer messages","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53769.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53769","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02815","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02772","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02809","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02816","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0522","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05307","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05236","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53769"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419909","reference_id":"2419909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5069","reference_id":"RHSA-2023:5069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53769"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gdf7-z8wt-zqae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67187?format=json","vulnerability_id":"VCID-gg3w-g76t-vkcm","summary":"kernel: drm/mipi-dsi: Detach devices when removing the host","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50489.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50489.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50489","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50489"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401549","reference_id":"2401549","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50489"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gg3w-g76t-vkcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78863?format=json","vulnerability_id":"VCID-ghef-adjn-rqcb","summary":"kernel: denial of service in tipc_conn_close","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03381","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04782","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04729","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04774","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00893","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371","reference_id":"2177371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u","reference_id":"#u","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/"}],"url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1382"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65470?format=json","vulnerability_id":"VCID-gjzs-dmbv-9yfa","summary":"kernel: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54259.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54259","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54259"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426250","reference_id":"2426250","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54259"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjzs-dmbv-9yfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67514?format=json","vulnerability_id":"VCID-gm7v-6v2w-wygh","summary":"kernel: drm/amdgpu: SDMA update use unlocked iterator","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50393.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50393","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396403","reference_id":"2396403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396403"},{"reference_url":"https://git.kernel.org/stable/c/3913f0179ba366f7d7d160c506ce00de1602bbc4","reference_id":"3913f0179ba366f7d7d160c506ce00de1602bbc4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"}],"url":"https://git.kernel.org/stable/c/3913f0179ba366f7d7d160c506ce00de1602bbc4"},{"reference_url":"https://git.kernel.org/stable/c/4ff3d517cebe8a29b9f3c302b5292bb1ce291e00","reference_id":"4ff3d517cebe8a29b9f3c302b5292bb1ce291e00","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"}],"url":"https://git.kernel.org/stable/c/4ff3d517cebe8a29b9f3c302b5292bb1ce291e00"},{"reference_url":"https://git.kernel.org/stable/c/b892c57a3a04c8de247ab9ee08a0a8cf53290e19","reference_id":"b892c57a3a04c8de247ab9ee08a0a8cf53290e19","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:05Z/"}],"url":"https://git.kernel.org/stable/c/b892c57a3a04c8de247ab9ee08a0a8cf53290e19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50393"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7v-6v2w-wygh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67988?format=json","vulnerability_id":"VCID-gnbs-xcjx-nqf2","summary":"kernel: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50258.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50258","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02605","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02643","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02641","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50258"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395431","reference_id":"2395431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50258"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gnbs-xcjx-nqf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79042?format=json","vulnerability_id":"VCID-gpdn-rup2-7fey","summary":"kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40133","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12925","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12899","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13332","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13095","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453","reference_id":"2133453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4831"}],"fixed_packages":[],"aliases":["CVE-2022-40133"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65788?format=json","vulnerability_id":"VCID-gumy-u2pm-w7hu","summary":"kernel: Linux kernel: Denial of Service due to memory leak in drm_client_target_cloned function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54091.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54091","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425176","reference_id":"2425176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-54091"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gumy-u2pm-w7hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65349?format=json","vulnerability_id":"VCID-h15v-get3-bqaw","summary":"kernel: Linux kernel: Denial of Service in mlx5 driver due to memory leaks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54238.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54238","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54238"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426125","reference_id":"2426125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54238"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h15v-get3-bqaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66151?format=json","vulnerability_id":"VCID-h669-ukx5-9qag","summary":"kernel: ipmi: fix use after free in _ipmi_destroy_user()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50677.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50677","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50677"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420325","reference_id":"2420325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50677"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h669-ukx5-9qag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67623?format=json","vulnerability_id":"VCID-hbbe-n2ng-byg9","summary":"kernel: drm/amdkfd: Fix kfd_process_device_init_vm error handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50354.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50354.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50354","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02261","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50354"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396109","reference_id":"2396109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396109"},{"reference_url":"https://git.kernel.org/stable/c/29d48b87db64b6697ddad007548e51d032081c59","reference_id":"29d48b87db64b6697ddad007548e51d032081c59","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"}],"url":"https://git.kernel.org/stable/c/29d48b87db64b6697ddad007548e51d032081c59"},{"reference_url":"https://git.kernel.org/stable/c/9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9","reference_id":"9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"}],"url":"https://git.kernel.org/stable/c/9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9"},{"reference_url":"https://git.kernel.org/stable/c/b6e78bd3bf2eb964c95eb2596d3cd367307a20b5","reference_id":"b6e78bd3bf2eb964c95eb2596d3cd367307a20b5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:31:35Z/"}],"url":"https://git.kernel.org/stable/c/b6e78bd3bf2eb964c95eb2596d3cd367307a20b5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50354"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hbbe-n2ng-byg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66244?format=json","vulnerability_id":"VCID-he5z-sfrw-47ge","summary":"kernel: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50619.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50619","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50619"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419867","reference_id":"2419867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50619"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-he5z-sfrw-47ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69331?format=json","vulnerability_id":"VCID-hhe2-3wg4-mucm","summary":"kernel: ice: xsk: prohibit usage of non-balanced queue id","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50003.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50003","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22933","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22899","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22915","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22771","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22855","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373615","reference_id":"2373615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50003"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhe2-3wg4-mucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65607?format=json","vulnerability_id":"VCID-hkx9-46zj-e3fb","summary":"kernel: Linux kernel: Denial of Service due to incorrect FDIR filter fallback logic","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54040.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54040","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54040"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424992","reference_id":"2424992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54040"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkx9-46zj-e3fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67902?format=json","vulnerability_id":"VCID-hnxx-dpf5-m3gu","summary":"kernel: Linux kernel: Denial of Service via deadlock in net/smc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53233.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53233","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0216","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02119","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02206","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02174","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02191","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02173","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02132","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/13085e1b5cab8ad802904d72e6a6dae85ae0cd20","reference_id":"13085e1b5cab8ad802904d72e6a6dae85ae0cd20","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"}],"url":"https://git.kernel.org/stable/c/13085e1b5cab8ad802904d72e6a6dae85ae0cd20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395339","reference_id":"2395339","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395339"},{"reference_url":"https://git.kernel.org/stable/c/3517584cf1b35bd02f4a90267ddf9dcf17bd9c87","reference_id":"3517584cf1b35bd02f4a90267ddf9dcf17bd9c87","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"}],"url":"https://git.kernel.org/stable/c/3517584cf1b35bd02f4a90267ddf9dcf17bd9c87"},{"reference_url":"https://git.kernel.org/stable/c/9708efad9ba5095b9bb7916e11a135b3bd66c071","reference_id":"9708efad9ba5095b9bb7916e11a135b3bd66c071","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"}],"url":"https://git.kernel.org/stable/c/9708efad9ba5095b9bb7916e11a135b3bd66c071"},{"reference_url":"https://git.kernel.org/stable/c/b615238e5bc01e13dc0610febddc1ca99bab1df6","reference_id":"b615238e5bc01e13dc0610febddc1ca99bab1df6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"}],"url":"https://git.kernel.org/stable/c/b615238e5bc01e13dc0610febddc1ca99bab1df6"},{"reference_url":"https://git.kernel.org/stable/c/c9ca2257150272df1b8d9ebe5059197ffea6e913","reference_id":"c9ca2257150272df1b8d9ebe5059197ffea6e913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:55:41Z/"}],"url":"https://git.kernel.org/stable/c/c9ca2257150272df1b8d9ebe5059197ffea6e913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53233"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hnxx-dpf5-m3gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67696?format=json","vulnerability_id":"VCID-hq32-ndng-kqcw","summary":"kernel: sctp: check send stream number after wait_for_sndbuf","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53296.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53296","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53296"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0443fff49d6352160c200064156c25898bd9f58c","reference_id":"0443fff49d6352160c200064156c25898bd9f58c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/0443fff49d6352160c200064156c25898bd9f58c"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395682","reference_id":"2395682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395682"},{"reference_url":"https://git.kernel.org/stable/c/2584024b23552c00d95b50255e47bd18d306d31a","reference_id":"2584024b23552c00d95b50255e47bd18d306d31a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/2584024b23552c00d95b50255e47bd18d306d31a"},{"reference_url":"https://git.kernel.org/stable/c/667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f","reference_id":"667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f"},{"reference_url":"https://git.kernel.org/stable/c/9346a1a21142357972a6f466ba6275ddc54b04ac","reference_id":"9346a1a21142357972a6f466ba6275ddc54b04ac","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/9346a1a21142357972a6f466ba6275ddc54b04ac"},{"reference_url":"https://git.kernel.org/stable/c/a615e7270318fa0b98bf1ff38daf6cf52d840312","reference_id":"a615e7270318fa0b98bf1ff38daf6cf52d840312","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/a615e7270318fa0b98bf1ff38daf6cf52d840312"},{"reference_url":"https://git.kernel.org/stable/c/b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce","reference_id":"b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce"},{"reference_url":"https://git.kernel.org/stable/c/d2128636b303aa9cf065055402ee6697409a8837","reference_id":"d2128636b303aa9cf065055402ee6697409a8837","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:12:16Z/"}],"url":"https://git.kernel.org/stable/c/d2128636b303aa9cf065055402ee6697409a8837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"}],"fixed_packages":[],"aliases":["CVE-2023-53296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hq32-ndng-kqcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78605?format=json","vulnerability_id":"VCID-hvkn-sk3f-pud6","summary":"kernel: Use after free bug in btsdio_remove due to race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1989","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04404","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04485","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04549","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05652","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05739","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0575","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05755","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945","reference_id":"2185945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088","reference_id":"?id=f132c2d13088","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230601-0004/","reference_id":"ntap-20230601-0004","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230601-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1989"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvkn-sk3f-pud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78356?format=json","vulnerability_id":"VCID-j7z5-3htn-vkd2","summary":"kernel: hash collisions in the IPv6 connection lookup table","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1206","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12191","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12242","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12053","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12264","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12251","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903","reference_id":"2175903","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0006/","reference_id":"ntap-20230929-0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230929-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6417-1/","reference_id":"USN-6417-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6417-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6460-1/","reference_id":"USN-6460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6460-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1206"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78892?format=json","vulnerability_id":"VCID-j8ze-t6w6-ekak","summary":"kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42895","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21329","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21331","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21308","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22829","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22882","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22902","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22816","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356","reference_id":"2147356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_id":"#b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"}],"url":"https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e"},{"reference_url":"https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_id":"b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"}],"url":"https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5858-1/","reference_id":"USN-5858-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5858-1/"},{"reference_url":"https://usn.ubuntu.com/5859-1/","reference_id":"USN-5859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5859-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5884-1/","reference_id":"USN-5884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5884-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5926-1/","reference_id":"USN-5926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5926-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42895"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67138?format=json","vulnerability_id":"VCID-jkj8-rva5-tfd1","summary":"kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53598.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53598","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401500","reference_id":"2401500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4356","reference_id":"RHSA-2021:4356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53598"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkj8-rva5-tfd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65424?format=json","vulnerability_id":"VCID-jm6q-xquz-77aw","summary":"kernel: scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54234.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54234.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54234","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54234"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426202","reference_id":"2426202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54234"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm6q-xquz-77aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66773?format=json","vulnerability_id":"VCID-jm8t-qsys-7bav","summary":"kernel: drm: Fix potential null-ptr-deref due to drmm_mode_config_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50556.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50556","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08306","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08459","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08543","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50556"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405727","reference_id":"2405727","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50556"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm8t-qsys-7bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67603?format=json","vulnerability_id":"VCID-jn9n-s2nn-8kft","summary":"kernel: mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53443.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53443","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02489","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02547","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396531","reference_id":"2396531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396531"},{"reference_url":"https://git.kernel.org/stable/c/4414a7ab80cebf715045e3c4d465feefbad21139","reference_id":"4414a7ab80cebf715045e3c4d465feefbad21139","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/4414a7ab80cebf715045e3c4d465feefbad21139"},{"reference_url":"https://git.kernel.org/stable/c/5a47bb71b1a94a279144fc3031d3c4591b38dd16","reference_id":"5a47bb71b1a94a279144fc3031d3c4591b38dd16","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/5a47bb71b1a94a279144fc3031d3c4591b38dd16"},{"reference_url":"https://git.kernel.org/stable/c/7195e642b49af60d4120fa1b45bd812ba528174f","reference_id":"7195e642b49af60d4120fa1b45bd812ba528174f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/7195e642b49af60d4120fa1b45bd812ba528174f"},{"reference_url":"https://git.kernel.org/stable/c/754e81ff44061dda68da0fd4ef51bd1aa9fbf2cf","reference_id":"754e81ff44061dda68da0fd4ef51bd1aa9fbf2cf","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/754e81ff44061dda68da0fd4ef51bd1aa9fbf2cf"},{"reference_url":"https://git.kernel.org/stable/c/9893771097b22a8743a446e45994a177795ca4da","reference_id":"9893771097b22a8743a446e45994a177795ca4da","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/9893771097b22a8743a446e45994a177795ca4da"},{"reference_url":"https://git.kernel.org/stable/c/dc9437e9889c3dacf1f320e3cf08da74127573fe","reference_id":"dc9437e9889c3dacf1f320e3cf08da74127573fe","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:18:43Z/"}],"url":"https://git.kernel.org/stable/c/dc9437e9889c3dacf1f320e3cf08da74127573fe"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53443"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9n-s2nn-8kft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78665?format=json","vulnerability_id":"VCID-jt33-xayh-5ke1","summary":"kernel: vmwgfx: double free within the handling of vmw_buffer_object objects","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33952","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0097","published_at":"2026-05-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00941","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00987","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00991","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00984","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00982","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00976","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00946","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0095","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00945","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00934","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00929","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0093","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00927","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00935","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00985","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212","reference_id":"2218212","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-33952","reference_id":"CVE-2023-33952","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4831"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292","reference_id":"ZDI-CAN-20292","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"}],"fixed_packages":[],"aliases":["CVE-2023-33952"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jt33-xayh-5ke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78716?format=json","vulnerability_id":"VCID-jure-kwde-eufu","summary":"kernel: fbcon: shift-out-of-bounds in fbcon_set_font()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3161","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02346","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02353","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02349","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02302","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02294","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485","reference_id":"2213485","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485"},{"reference_url":"https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be","reference_id":"2b09d5d364986f724f17001ccfe4126b9b43a0be","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"}],"url":"https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3161"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jure-kwde-eufu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67571?format=json","vulnerability_id":"VCID-jvuw-pxdt-afb9","summary":"kernel: wifi: mt76: dma: fix memory leak running mt76_dma_tx_cleanup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53430.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53430","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05593","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05235","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396497","reference_id":"2396497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396497"},{"reference_url":"https://git.kernel.org/stable/c/3f7dda36e0b6dfa2cd26191f754ba061ab8191f2","reference_id":"3f7dda36e0b6dfa2cd26191f754ba061ab8191f2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:14:49Z/"}],"url":"https://git.kernel.org/stable/c/3f7dda36e0b6dfa2cd26191f754ba061ab8191f2"},{"reference_url":"https://git.kernel.org/stable/c/604990fee0a6d608a6cca179ae474f2a1c6add8a","reference_id":"604990fee0a6d608a6cca179ae474f2a1c6add8a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:14:49Z/"}],"url":"https://git.kernel.org/stable/c/604990fee0a6d608a6cca179ae474f2a1c6add8a"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53430"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuw-pxdt-afb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67191?format=json","vulnerability_id":"VCID-jwe4-fgr4-zycp","summary":"kernel: drm: amd: display: Fix memory leakage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53605.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53605","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53605"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401553","reference_id":"2401553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53605"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwe4-fgr4-zycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65732?format=json","vulnerability_id":"VCID-k4wg-5xv6-2ufy","summary":"kernel: Linux kernel rt2x00 Wi-Fi driver: Denial of Service via memory leak during device removal","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54131.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54131","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54131"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425120","reference_id":"2425120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54131"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4wg-5xv6-2ufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65244?format=json","vulnerability_id":"VCID-kc7z-fg9w-8uhr","summary":"kernel: dm flakey: don't corrupt the zero page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54317.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54317","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426017","reference_id":"2426017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54317"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc7z-fg9w-8uhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66965?format=json","vulnerability_id":"VCID-kd1y-s2dm-yqfh","summary":"kernel: wifi: mt7601u: fix an integer underflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53679.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53679","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402215","reference_id":"2402215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53679"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kd1y-s2dm-yqfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78874?format=json","vulnerability_id":"VCID-ke38-q17b-13hz","summary":"kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45887","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01858","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0162","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06086","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06072","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06012","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/","reference_id":"20221115131822.6640-1-imv4bel%40gmail.com","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/"},{"reference_url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/","reference_id":"20221115131822.6640-5-imv4bel%40gmail.com","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520","reference_id":"2148520","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457","reference_id":"?id=517a281338322ff8293f988771c98aaa7205e457","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230113-0006/","reference_id":"ntap-20230113-0006","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230113-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45887"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ke38-q17b-13hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66136?format=json","vulnerability_id":"VCID-khqx-5cyy-p3fv","summary":"kernel: md/raid10: fix null-ptr-deref in raid10_sync_request","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53832.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53832","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420309","reference_id":"2420309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2023-53832"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khqx-5cyy-p3fv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67692?format=json","vulnerability_id":"VCID-khyt-2dss-uyb7","summary":"kernel: md/raid10: fix leak of 'r10bio->remaining' for recovery","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53299.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53299","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/11141630f03efffdfe260b3582b2d93d38171b97","reference_id":"11141630f03efffdfe260b3582b2d93d38171b97","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/11141630f03efffdfe260b3582b2d93d38171b97"},{"reference_url":"https://git.kernel.org/stable/c/1697fb124c6d6c5237e9cbd78890310154738084","reference_id":"1697fb124c6d6c5237e9cbd78890310154738084","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/1697fb124c6d6c5237e9cbd78890310154738084"},{"reference_url":"https://git.kernel.org/stable/c/1d2c6c6e37fe5de11fd01a82badf03390e12df7a","reference_id":"1d2c6c6e37fe5de11fd01a82badf03390e12df7a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/1d2c6c6e37fe5de11fd01a82badf03390e12df7a"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395677","reference_id":"2395677","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395677"},{"reference_url":"https://git.kernel.org/stable/c/26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e","reference_id":"26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e"},{"reference_url":"https://git.kernel.org/stable/c/3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6","reference_id":"3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6"},{"reference_url":"https://git.kernel.org/stable/c/4f82e7e07cdaf2947d71968e3d6b73370a217093","reference_id":"4f82e7e07cdaf2947d71968e3d6b73370a217093","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/4f82e7e07cdaf2947d71968e3d6b73370a217093"},{"reference_url":"https://git.kernel.org/stable/c/8c5d5d7ffd1e76734811b8ea5417cf0432b9952c","reference_id":"8c5d5d7ffd1e76734811b8ea5417cf0432b9952c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/8c5d5d7ffd1e76734811b8ea5417cf0432b9952c"},{"reference_url":"https://git.kernel.org/stable/c/8d09065802c53cc938d162b62f6c4150b392c90e","reference_id":"8d09065802c53cc938d162b62f6c4150b392c90e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/8d09065802c53cc938d162b62f6c4150b392c90e"},{"reference_url":"https://git.kernel.org/stable/c/cb827ed2bb34480dc102146d3a1f89fdbcafc028","reference_id":"cb827ed2bb34480dc102146d3a1f89fdbcafc028","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:13:08Z/"}],"url":"https://git.kernel.org/stable/c/cb827ed2bb34480dc102146d3a1f89fdbcafc028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2023-53299"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khyt-2dss-uyb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71261?format=json","vulnerability_id":"VCID-kpc5-yrnm-rqfb","summary":"kernel: mm/page_owner: use strscpy() instead of strlcpy()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49401.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49401.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49401","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3657","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36112","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36181","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36144","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36635","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49401"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347828","reference_id":"2347828","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49401"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpc5-yrnm-rqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78852?format=json","vulnerability_id":"VCID-ks9z-m9jz-tybr","summary":"kernel: KVM: x86/mmu: race condition in direct_page_fault()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45869","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02938","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02925","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02934","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04913","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04917","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05205","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45869"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317","reference_id":"2151317","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15","reference_id":"?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T18:57:15Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45869"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ks9z-m9jz-tybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71478?format=json","vulnerability_id":"VCID-kvrz-u8vr-zqds","summary":"kernel: cgroup: Use separate src/dst nodes when preloading css_sets for migration","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49647.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49647","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03091","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04034","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03979","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03996","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04033","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10656","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23965","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49647"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/05f7658210d1d331e8dd4cb6e7bbbe3df5f5ac27","reference_id":"05f7658210d1d331e8dd4cb6e7bbbe3df5f5ac27","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/05f7658210d1d331e8dd4cb6e7bbbe3df5f5ac27"},{"reference_url":"https://git.kernel.org/stable/c/07fd5b6cdf3cc30bfde8fe0f644771688be04447","reference_id":"07fd5b6cdf3cc30bfde8fe0f644771688be04447","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/07fd5b6cdf3cc30bfde8fe0f644771688be04447"},{"reference_url":"https://git.kernel.org/stable/c/0e41774b564befa6d271e8d5086bf870d617a4e6","reference_id":"0e41774b564befa6d271e8d5086bf870d617a4e6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/0e41774b564befa6d271e8d5086bf870d617a4e6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348050","reference_id":"2348050","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348050"},{"reference_url":"https://git.kernel.org/stable/c/54aee4e5ce8c21555286a6333e46c1713880cf93","reference_id":"54aee4e5ce8c21555286a6333e46c1713880cf93","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/54aee4e5ce8c21555286a6333e46c1713880cf93"},{"reference_url":"https://git.kernel.org/stable/c/7657e3958535d101a24ab4400f9b8062b9107cc4","reference_id":"7657e3958535d101a24ab4400f9b8062b9107cc4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/7657e3958535d101a24ab4400f9b8062b9107cc4"},{"reference_url":"https://git.kernel.org/stable/c/ad44e05f3e016bdcb1ad25af35ade5b5f41ccd68","reference_id":"ad44e05f3e016bdcb1ad25af35ade5b5f41ccd68","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/ad44e05f3e016bdcb1ad25af35ade5b5f41ccd68"},{"reference_url":"https://git.kernel.org/stable/c/cec2bbdcc14fbaa6b95ee15a7c423b05d97038be","reference_id":"cec2bbdcc14fbaa6b95ee15a7c423b05d97038be","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:22Z/"}],"url":"https://git.kernel.org/stable/c/cec2bbdcc14fbaa6b95ee15a7c423b05d97038be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49647"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvrz-u8vr-zqds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67844?format=json","vulnerability_id":"VCID-kyym-wgpn-xyhn","summary":"kernel: drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50287.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50287","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02197","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395279","reference_id":"2395279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50287"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyym-wgpn-xyhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78259?format=json","vulnerability_id":"VCID-kz9r-zumw-5ydf","summary":"kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3609","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02148","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0215","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02127","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02112","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02153","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02168","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02133","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc","reference_id":"04c55383fa5689357bcdd2c8036725a55ed632bc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201","reference_id":"2225201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc","reference_id":"commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"},{"reference_url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230818-0005/","reference_id":"ntap-20230818-0005","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230818-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5574","reference_id":"RHSA-2023:5574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5621","reference_id":"RHSA-2023:5621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5622","reference_id":"RHSA-2023:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5628","reference_id":"RHSA-2023:5628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5775","reference_id":"RHSA-2023:5775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5794","reference_id":"RHSA-2023:5794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6799","reference_id":"RHSA-2023:6799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6813","reference_id":"RHSA-2023:6813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7294","reference_id":"RHSA-2023:7294","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7410","reference_id":"RHSA-2023:7410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7417","reference_id":"RHSA-2023:7417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7431","reference_id":"RHSA-2023:7431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7434","reference_id":"RHSA-2023:7434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0999","reference_id":"RHSA-2024:0999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://usn.ubuntu.com/6285-1/","reference_id":"USN-6285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6285-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3609"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kz9r-zumw-5ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65347?format=json","vulnerability_id":"VCID-m2wm-3hmb-xbd7","summary":"kernel: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50829.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50829","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15215","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50829"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50829","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50829"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426123","reference_id":"2426123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50829"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2wm-3hmb-xbd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65703?format=json","vulnerability_id":"VCID-m8bu-d32s-juht","summary":"kernel: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50781.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50781","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425091","reference_id":"2425091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50781"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m8bu-d32s-juht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65258?format=json","vulnerability_id":"VCID-mfx1-j7a5-aye4","summary":"kernel: ipv6: Fix an uninit variable access bug in __ip6_make_skb()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54265.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54265","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426032","reference_id":"2426032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54265"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfx1-j7a5-aye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67807?format=json","vulnerability_id":"VCID-mj87-myus-3kcr","summary":"kernel: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53229.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53229","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/022c8320d9eb7394538bd716fa1a07a5ed92621b","reference_id":"022c8320d9eb7394538bd716fa1a07a5ed92621b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/022c8320d9eb7394538bd716fa1a07a5ed92621b"},{"reference_url":"https://git.kernel.org/stable/c/12b220a6171faf10638ab683a975cadcf1a352d6","reference_id":"12b220a6171faf10638ab683a975cadcf1a352d6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/12b220a6171faf10638ab683a975cadcf1a352d6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395236","reference_id":"2395236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395236"},{"reference_url":"https://git.kernel.org/stable/c/30c5a016a37a668c1c07442cf94de6e99ea7417a","reference_id":"30c5a016a37a668c1c07442cf94de6e99ea7417a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/30c5a016a37a668c1c07442cf94de6e99ea7417a"},{"reference_url":"https://git.kernel.org/stable/c/3fe20515449a80a177526d2ecd13b43f6ee41aeb","reference_id":"3fe20515449a80a177526d2ecd13b43f6ee41aeb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/3fe20515449a80a177526d2ecd13b43f6ee41aeb"},{"reference_url":"https://git.kernel.org/stable/c/73752a39e2a6e38eee3ba90ece2ded598ea88006","reference_id":"73752a39e2a6e38eee3ba90ece2ded598ea88006","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/73752a39e2a6e38eee3ba90ece2ded598ea88006"},{"reference_url":"https://git.kernel.org/stable/c/7e68d7c640d41d8a371b8f6c2d2682ea437cbe21","reference_id":"7e68d7c640d41d8a371b8f6c2d2682ea437cbe21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/7e68d7c640d41d8a371b8f6c2d2682ea437cbe21"},{"reference_url":"https://git.kernel.org/stable/c/a3593082e0dadf87f17ea4ca9fa0210caaa2aebf","reference_id":"a3593082e0dadf87f17ea4ca9fa0210caaa2aebf","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/a3593082e0dadf87f17ea4ca9fa0210caaa2aebf"},{"reference_url":"https://git.kernel.org/stable/c/db8d32d6b25fdb75c387daee496b96209d477780","reference_id":"db8d32d6b25fdb75c387daee496b96209d477780","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:54:52Z/"}],"url":"https://git.kernel.org/stable/c/db8d32d6b25fdb75c387daee496b96209d477780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53229"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mj87-myus-3kcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66967?format=json","vulnerability_id":"VCID-mpr7-f7sr-5bf8","summary":"kernel: drm/i915: Fix system suspend without fbdev being initialized","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53678.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53678","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402217","reference_id":"2402217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53678"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mpr7-f7sr-5bf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70708?format=json","vulnerability_id":"VCID-mqhp-j996-13hv","summary":"kernel: net: fix NULL pointer in skb_segment_list","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52991.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52991.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52991","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06175","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06091","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06172","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30875","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/046de74f9af92ae9ffce75fa22a1795223f4fb54","reference_id":"046de74f9af92ae9ffce75fa22a1795223f4fb54","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"}],"url":"https://git.kernel.org/stable/c/046de74f9af92ae9ffce75fa22a1795223f4fb54"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355500","reference_id":"2355500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355500"},{"reference_url":"https://git.kernel.org/stable/c/6446369fb9f083ce032448c5047da08e298b22e6","reference_id":"6446369fb9f083ce032448c5047da08e298b22e6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"}],"url":"https://git.kernel.org/stable/c/6446369fb9f083ce032448c5047da08e298b22e6"},{"reference_url":"https://git.kernel.org/stable/c/876e8ca8366735a604bac86ff7e2732fc9d85d2d","reference_id":"876e8ca8366735a604bac86ff7e2732fc9d85d2d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"}],"url":"https://git.kernel.org/stable/c/876e8ca8366735a604bac86ff7e2732fc9d85d2d"},{"reference_url":"https://git.kernel.org/stable/c/888dad6f3e85e3b2f8389bd6478f181efc72534d","reference_id":"888dad6f3e85e3b2f8389bd6478f181efc72534d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:20Z/"}],"url":"https://git.kernel.org/stable/c/888dad6f3e85e3b2f8389bd6478f181efc72534d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52991"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqhp-j996-13hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67752?format=json","vulnerability_id":"VCID-mvbf-u5ft-xkbb","summary":"kernel: nfsd: Fix a memory leak in an error handling path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50348.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50348.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50348","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50348"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50348","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50348"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395851","reference_id":"2395851","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395851"},{"reference_url":"https://git.kernel.org/stable/c/733dd17158f96aaa25408dc39bbb2738fda9300e","reference_id":"733dd17158f96aaa25408dc39bbb2738fda9300e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/733dd17158f96aaa25408dc39bbb2738fda9300e"},{"reference_url":"https://git.kernel.org/stable/c/acc393aecda05bf64ed13b732931462e07a1bf08","reference_id":"acc393aecda05bf64ed13b732931462e07a1bf08","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/acc393aecda05bf64ed13b732931462e07a1bf08"},{"reference_url":"https://git.kernel.org/stable/c/aed8816305575b38dcc77feb6f1bc1d0ed32f5b8","reference_id":"aed8816305575b38dcc77feb6f1bc1d0ed32f5b8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/aed8816305575b38dcc77feb6f1bc1d0ed32f5b8"},{"reference_url":"https://git.kernel.org/stable/c/cc3bca2110ac85cd964da997ef83d84cab0d49fb","reference_id":"cc3bca2110ac85cd964da997ef83d84cab0d49fb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/cc3bca2110ac85cd964da997ef83d84cab0d49fb"},{"reference_url":"https://git.kernel.org/stable/c/e060c4b9f33c1fca74df26d57a98e784295327e6","reference_id":"e060c4b9f33c1fca74df26d57a98e784295327e6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/e060c4b9f33c1fca74df26d57a98e784295327e6"},{"reference_url":"https://git.kernel.org/stable/c/fd1ef88049de09bc70d60b549992524cfc0e66ff","reference_id":"fd1ef88049de09bc70d60b549992524cfc0e66ff","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:27Z/"}],"url":"https://git.kernel.org/stable/c/fd1ef88049de09bc70d60b549992524cfc0e66ff"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50348"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvbf-u5ft-xkbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67946?format=json","vulnerability_id":"VCID-myjf-uqfn-b7bs","summary":"kernel: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53254.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53254","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03128","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03058","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03048","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03076","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03122","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03063","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/198102c9103fc78d8478495971947af77edb05c1","reference_id":"198102c9103fc78d8478495971947af77edb05c1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"}],"url":"https://git.kernel.org/stable/c/198102c9103fc78d8478495971947af77edb05c1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395386","reference_id":"2395386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395386"},{"reference_url":"https://git.kernel.org/stable/c/2f588d0345d69a35e451077afed428fd057a5e34","reference_id":"2f588d0345d69a35e451077afed428fd057a5e34","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"}],"url":"https://git.kernel.org/stable/c/2f588d0345d69a35e451077afed428fd057a5e34"},{"reference_url":"https://git.kernel.org/stable/c/dea49f2993f57d8a2df2cacb0bf649ef49b28879","reference_id":"dea49f2993f57d8a2df2cacb0bf649ef49b28879","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:01:14Z/"}],"url":"https://git.kernel.org/stable/c/dea49f2993f57d8a2df2cacb0bf649ef49b28879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53254"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myjf-uqfn-b7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67934?format=json","vulnerability_id":"VCID-myxg-t4ps-p7ew","summary":"kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53245","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06479","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06036","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06266","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06455","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06467","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53245"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050","reference_id":"048ebc9a28fb918ee635dd4b2fcf4248eb6e4050","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050"},{"reference_url":"https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22","reference_id":"1678408d08f31a694d5150a56796dd04c9710b22","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22"},{"reference_url":"https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881","reference_id":"175544ad48cbf56affeef2a679c6a4d4fb1e2881","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395372","reference_id":"2395372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395372"},{"reference_url":"https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469","reference_id":"311db605e07f0d4fc0cc7ddb74f1e5692ea2f469","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469"},{"reference_url":"https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264","reference_id":"763c06565055ae373fe7f89c11e1447bd1ded264","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264"},{"reference_url":"https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d","reference_id":"7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d"},{"reference_url":"https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd","reference_id":"cd87f4df9865a53807001ed12c0f0420b14ececd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd"},{"reference_url":"https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29","reference_id":"ed70fa5629a8b992a5372d7044d1db1f8fa6de29","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/"}],"url":"https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53245"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myxg-t4ps-p7ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67797?format=json","vulnerability_id":"VCID-n3hc-9st6-jfb1","summary":"kernel: drm/vkms: Fix memory leak in vkms_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50269.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50269","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04236","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50269"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395226","reference_id":"2395226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13960","reference_id":"RHSA-2025:13960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13961","reference_id":"RHSA-2025:13961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"}],"fixed_packages":[],"aliases":["CVE-2022-50269"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n3hc-9st6-jfb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66090?format=json","vulnerability_id":"VCID-n5sq-sfyw-wkbr","summary":"kernel: dm flakey: fix a crash with invalid table line","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53786.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53786","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11995","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11991","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11967","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12422","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19821","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420253","reference_id":"2420253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53786"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n5sq-sfyw-wkbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65455?format=json","vulnerability_id":"VCID-n86h-xjhp-s3c8","summary":"kernel: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54286.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54286","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426235","reference_id":"2426235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54286"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n86h-xjhp-s3c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78238?format=json","vulnerability_id":"VCID-n89e-y6eu-4ucf","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261965","reference_id":"2261965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5235","reference_id":"RHSA-2023:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5238","reference_id":"RHSA-2023:5238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5548","reference_id":"RHSA-2023:5548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5575","reference_id":"RHSA-2023:5575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5580","reference_id":"RHSA-2023:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5588","reference_id":"RHSA-2023:5588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5589","reference_id":"RHSA-2023:5589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5628","reference_id":"RHSA-2023:5628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5775","reference_id":"RHSA-2023:5775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5794","reference_id":"RHSA-2023:5794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6383-1/","reference_id":"USN-6383-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6383-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6386-1/","reference_id":"USN-6386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-1/"},{"reference_url":"https://usn.ubuntu.com/6386-2/","reference_id":"USN-6386-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-2/"},{"reference_url":"https://usn.ubuntu.com/6386-3/","reference_id":"USN-6386-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-3/"},{"reference_url":"https://usn.ubuntu.com/6387-1/","reference_id":"USN-6387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-1/"},{"reference_url":"https://usn.ubuntu.com/6387-2/","reference_id":"USN-6387-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-2/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4128"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n89e-y6eu-4ucf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69798?format=json","vulnerability_id":"VCID-ncm1-gdwz-fkeq","summary":"kernel: dm crypt: add cond_resched() to dmcrypt_write()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53051.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53051","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13198","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13096","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13176","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13169","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13447","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1893","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363688","reference_id":"2363688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53051"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ncm1-gdwz-fkeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78256?format=json","vulnerability_id":"VCID-netb-fxrv-zyft","summary":"kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3772","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01288","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01286","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01669","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01676","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01467","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943","reference_id":"2218943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6415-1/","reference_id":"USN-6415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6415-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"},{"reference_url":"https://usn.ubuntu.com/6464-1/","reference_id":"USN-6464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6464-1/"},{"reference_url":"https://usn.ubuntu.com/6465-1/","reference_id":"USN-6465-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-1/"},{"reference_url":"https://usn.ubuntu.com/6465-2/","reference_id":"USN-6465-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-2/"},{"reference_url":"https://usn.ubuntu.com/6465-3/","reference_id":"USN-6465-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6516-1/","reference_id":"USN-6516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6516-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3772"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-netb-fxrv-zyft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67578?format=json","vulnerability_id":"VCID-ng6v-zjsu-gugc","summary":"kernel: media: uvcvideo: Handle cameras with invalid descriptors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53437.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53437","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02489","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02547","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53437"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/11196ee3916e50a5da3c1e6ecda19a02dca14ba3","reference_id":"11196ee3916e50a5da3c1e6ecda19a02dca14ba3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/11196ee3916e50a5da3c1e6ecda19a02dca14ba3"},{"reference_url":"https://git.kernel.org/stable/c/1a76cfc388cf105d3e04ac592670a52a3864b1ba","reference_id":"1a76cfc388cf105d3e04ac592670a52a3864b1ba","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/1a76cfc388cf105d3e04ac592670a52a3864b1ba"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396504","reference_id":"2396504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396504"},{"reference_url":"https://git.kernel.org/stable/c/2914259fcea23971c6fed8b2618d3a729a78c365","reference_id":"2914259fcea23971c6fed8b2618d3a729a78c365","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/2914259fcea23971c6fed8b2618d3a729a78c365"},{"reference_url":"https://git.kernel.org/stable/c/31a8d11d28b57656cebfbd4c0b8b76f6ad5b017d","reference_id":"31a8d11d28b57656cebfbd4c0b8b76f6ad5b017d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/31a8d11d28b57656cebfbd4c0b8b76f6ad5b017d"},{"reference_url":"https://git.kernel.org/stable/c/41ddb251c68ac75c101d3a50a68c4629c9055e4c","reference_id":"41ddb251c68ac75c101d3a50a68c4629c9055e4c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/41ddb251c68ac75c101d3a50a68c4629c9055e4c"},{"reference_url":"https://git.kernel.org/stable/c/4e4e6ca62e77539d4df8d13137e2683b10baddd9","reference_id":"4e4e6ca62e77539d4df8d13137e2683b10baddd9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/4e4e6ca62e77539d4df8d13137e2683b10baddd9"},{"reference_url":"https://git.kernel.org/stable/c/c8f4a424af5879baefb0fb8a8a09b09ea1779483","reference_id":"c8f4a424af5879baefb0fb8a8a09b09ea1779483","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/c8f4a424af5879baefb0fb8a8a09b09ea1779483"},{"reference_url":"https://git.kernel.org/stable/c/d8aa2e1ae6426d7cbddf1735aed1a63ddf0e6909","reference_id":"d8aa2e1ae6426d7cbddf1735aed1a63ddf0e6909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:16:56Z/"}],"url":"https://git.kernel.org/stable/c/d8aa2e1ae6426d7cbddf1735aed1a63ddf0e6909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53437"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng6v-zjsu-gugc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67372?format=json","vulnerability_id":"VCID-nmbx-wx99-6kcj","summary":"kernel: mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50464.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50464.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50464","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50464"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400807","reference_id":"2400807","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50464"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmbx-wx99-6kcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67862?format=json","vulnerability_id":"VCID-nqtn-45jw-7qc5","summary":"kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53185.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53185","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395297","reference_id":"2395297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2023-53185"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqtn-45jw-7qc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67806?format=json","vulnerability_id":"VCID-nukc-v8yh-wqdc","summary":"kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50318","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235","reference_id":"2395235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2022-50318"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nukc-v8yh-wqdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75983?format=json","vulnerability_id":"VCID-p22p-bhwt-h3gy","summary":"kernel: net: sched: sch: Bounds check priority","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52734.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52734.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282728","reference_id":"2282728","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52734"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p22p-bhwt-h3gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67093?format=json","vulnerability_id":"VCID-p665-8j9c-nqfk","summary":"kernel: IB/mad: Don't call to function that might sleep while in atomic context","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50472.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50472","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50472"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401455","reference_id":"2401455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50472"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p665-8j9c-nqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67542?format=json","vulnerability_id":"VCID-p999-kgu6-h7e5","summary":"kernel: NFS: Fix an Oops in nfs_d_automount()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50385.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50385","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50385"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396432","reference_id":"2396432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396432"},{"reference_url":"https://git.kernel.org/stable/c/35e3b6ae84935d0d7ff76cbdaa83411b0ad5e471","reference_id":"35e3b6ae84935d0d7ff76cbdaa83411b0ad5e471","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:48:52Z/"}],"url":"https://git.kernel.org/stable/c/35e3b6ae84935d0d7ff76cbdaa83411b0ad5e471"},{"reference_url":"https://git.kernel.org/stable/c/5458bc0f9df639d83471ca384152cc62dbee0aeb","reference_id":"5458bc0f9df639d83471ca384152cc62dbee0aeb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:48:52Z/"}],"url":"https://git.kernel.org/stable/c/5458bc0f9df639d83471ca384152cc62dbee0aeb"},{"reference_url":"https://git.kernel.org/stable/c/6f3d56783fbed861e483736a7001bdafd0dddd53","reference_id":"6f3d56783fbed861e483736a7001bdafd0dddd53","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:48:52Z/"}],"url":"https://git.kernel.org/stable/c/6f3d56783fbed861e483736a7001bdafd0dddd53"},{"reference_url":"https://git.kernel.org/stable/c/b6fd25d64b0de27991d6bd677f0adf69ad6ff07a","reference_id":"b6fd25d64b0de27991d6bd677f0adf69ad6ff07a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:48:52Z/"}],"url":"https://git.kernel.org/stable/c/b6fd25d64b0de27991d6bd677f0adf69ad6ff07a"},{"reference_url":"https://git.kernel.org/stable/c/f12377abac15fb4e8698225ac386894f8ae63598","reference_id":"f12377abac15fb4e8698225ac386894f8ae63598","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:48:52Z/"}],"url":"https://git.kernel.org/stable/c/f12377abac15fb4e8698225ac386894f8ae63598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50385"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p999-kgu6-h7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67657?format=json","vulnerability_id":"VCID-pa6q-5jjc-duet","summary":"kernel: skbuff: Account for tail adjustment during pull operations","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50365.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50365","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50365"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396145","reference_id":"2396145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396145"},{"reference_url":"https://git.kernel.org/stable/c/2d59f0ca153e9573ec4f140988c0ccca0eb4181b","reference_id":"2d59f0ca153e9573ec4f140988c0ccca0eb4181b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/2d59f0ca153e9573ec4f140988c0ccca0eb4181b"},{"reference_url":"https://git.kernel.org/stable/c/2d7afdcbc9d32423f177ee12b7c93783aea338fb","reference_id":"2d7afdcbc9d32423f177ee12b7c93783aea338fb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/2d7afdcbc9d32423f177ee12b7c93783aea338fb"},{"reference_url":"https://git.kernel.org/stable/c/331615d837f4979eb91a336a223a5c7f7886ecd5","reference_id":"331615d837f4979eb91a336a223a5c7f7886ecd5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/331615d837f4979eb91a336a223a5c7f7886ecd5"},{"reference_url":"https://git.kernel.org/stable/c/668dc454bcbd1da73605201ff43f988c70848215","reference_id":"668dc454bcbd1da73605201ff43f988c70848215","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/668dc454bcbd1da73605201ff43f988c70848215"},{"reference_url":"https://git.kernel.org/stable/c/6ac417d71b80e74b002313fcd73f7e9008e8e457","reference_id":"6ac417d71b80e74b002313fcd73f7e9008e8e457","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/6ac417d71b80e74b002313fcd73f7e9008e8e457"},{"reference_url":"https://git.kernel.org/stable/c/821be5a5ab09a40ba09cb5ba354f18cf7996fea0","reference_id":"821be5a5ab09a40ba09cb5ba354f18cf7996fea0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/821be5a5ab09a40ba09cb5ba354f18cf7996fea0"},{"reference_url":"https://git.kernel.org/stable/c/8fb773eed4909ef5dc1bbeb3629a337d3336df7e","reference_id":"8fb773eed4909ef5dc1bbeb3629a337d3336df7e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/8fb773eed4909ef5dc1bbeb3629a337d3336df7e"},{"reference_url":"https://git.kernel.org/stable/c/946dd5dc4fcc4123cdfe3942b20012c4448cf89a","reference_id":"946dd5dc4fcc4123cdfe3942b20012c4448cf89a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/946dd5dc4fcc4123cdfe3942b20012c4448cf89a"},{"reference_url":"https://git.kernel.org/stable/c/ff3743d00f41d803e6ab9334962b674f3b7fd0cb","reference_id":"ff3743d00f41d803e6ab9334962b674f3b7fd0cb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:34:36Z/"}],"url":"https://git.kernel.org/stable/c/ff3743d00f41d803e6ab9334962b674f3b7fd0cb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50365"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pa6q-5jjc-duet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66078?format=json","vulnerability_id":"VCID-pa7v-4ecc-k3a2","summary":"kernel: scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53803.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53803","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420240","reference_id":"2420240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10772","reference_id":"RHSA-2024:10772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10772"}],"fixed_packages":[],"aliases":["CVE-2023-53803"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pa7v-4ecc-k3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67656?format=json","vulnerability_id":"VCID-pex6-rhfb-xqgb","summary":"kernel: USB: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53359.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53359.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53359","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04066","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03915","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53359"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396144","reference_id":"2396144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396144"},{"reference_url":"https://git.kernel.org/stable/c/30374434edab20e25776f8ecb4bc9d1e54309487","reference_id":"30374434edab20e25776f8ecb4bc9d1e54309487","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"}],"url":"https://git.kernel.org/stable/c/30374434edab20e25776f8ecb4bc9d1e54309487"},{"reference_url":"https://git.kernel.org/stable/c/6683327b51a601daba32900072349dfa1d4e8fea","reference_id":"6683327b51a601daba32900072349dfa1d4e8fea","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"}],"url":"https://git.kernel.org/stable/c/6683327b51a601daba32900072349dfa1d4e8fea"},{"reference_url":"https://git.kernel.org/stable/c/c68ece7baf2aa9783b8244482c03010d477d4a93","reference_id":"c68ece7baf2aa9783b8244482c03010d477d4a93","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"}],"url":"https://git.kernel.org/stable/c/c68ece7baf2aa9783b8244482c03010d477d4a93"},{"reference_url":"https://git.kernel.org/stable/c/cc00340fb1226a2a3a5cf15473ac417da3c952f1","reference_id":"cc00340fb1226a2a3a5cf15473ac417da3c952f1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:43:41Z/"}],"url":"https://git.kernel.org/stable/c/cc00340fb1226a2a3a5cf15473ac417da3c952f1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53359"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pex6-rhfb-xqgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67125?format=json","vulnerability_id":"VCID-pfe5-kx4z-43bf","summary":"kernel: wifi: iwlwifi: mvm: fix potential array out of bounds access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53575.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53575","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0596","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05881","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05957","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53575"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401487","reference_id":"2401487","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53575"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pfe5-kx4z-43bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69840?format=json","vulnerability_id":"VCID-phw9-bpnj-nub2","summary":"kernel: net/mlx5: Fix steering rules cleanup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53079.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53079","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15491","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15233","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15361","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29487","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29528","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29486","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363732","reference_id":"2363732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53079"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-phw9-bpnj-nub2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66941?format=json","vulnerability_id":"VCID-pqja-9s5g-nkbe","summary":"kernel: wifi: ath9k: hif_usb: fix memory leak of remain_skbs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53641.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53641","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02783","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04032","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04047","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04085","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402188","reference_id":"2402188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53641"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pqja-9s5g-nkbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67168?format=json","vulnerability_id":"VCID-puv9-kjvp-1qbt","summary":"kernel: cpufreq: Init completion before kobject_init_and_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50473.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50473","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50473"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401530","reference_id":"2401530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50473"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-puv9-kjvp-1qbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67167?format=json","vulnerability_id":"VCID-py6r-aqaw-73hg","summary":"kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50475.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50475","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50475"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401529","reference_id":"2401529","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1988","reference_id":"RHSA-2022:1988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50475"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-py6r-aqaw-73hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78471?format=json","vulnerability_id":"VCID-pyu4-rsap-2fhx","summary":"kernel: out-of-bounds access in relay_file_read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3268","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00622","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00615","published_at":"2026-04-04T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0061","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00616","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00618","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00609","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00719","published_at":"2026-05-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00689","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00688","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00682","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0073","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00732","published_at":"2026-05-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00739","published_at":"2026-05-05T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00728","published_at":"2026-05-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00725","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502","reference_id":"2215502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://www.debian.org/security/2023/dsa-5448","reference_id":"dsa-5448","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5448"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1","reference_id":"?id=43ec16f1450f4936025a9bdf1a273affdb9732c1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230824-0006/","reference_id":"ntap-20230824-0006","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230824-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/","reference_id":"T","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/"},{"reference_url":"https://usn.ubuntu.com/6252-1/","reference_id":"USN-6252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6252-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3268"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyu4-rsap-2fhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65725?format=json","vulnerability_id":"VCID-q54u-yfc2-w7bb","summary":"kernel: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54108.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54108","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425113","reference_id":"2425113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54108"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q54u-yfc2-w7bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65616?format=json","vulnerability_id":"VCID-qa3a-a7pr-x3a2","summary":"kernel: Linux kernel: Denial of Service in ice driver via uninitialized transmit rings","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50710.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50710","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425001","reference_id":"2425001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50710"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qa3a-a7pr-x3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70667?format=json","vulnerability_id":"VCID-qcbg-g6j5-zybp","summary":"kernel: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49752.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49752","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07095","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0722","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22599","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22584","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22538","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25733","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49752"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355453","reference_id":"2355453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355453"},{"reference_url":"https://git.kernel.org/stable/c/39af728649b05e88a2b40e714feeee6451c3f18e","reference_id":"39af728649b05e88a2b40e714feeee6451c3f18e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"}],"url":"https://git.kernel.org/stable/c/39af728649b05e88a2b40e714feeee6451c3f18e"},{"reference_url":"https://git.kernel.org/stable/c/7701a4bd45c11f9a289d8f262fad05705a012339","reference_id":"7701a4bd45c11f9a289d8f262fad05705a012339","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"}],"url":"https://git.kernel.org/stable/c/7701a4bd45c11f9a289d8f262fad05705a012339"},{"reference_url":"https://git.kernel.org/stable/c/e0472947bead3af94cc968ce35fc0414803a2f65","reference_id":"e0472947bead3af94cc968ce35fc0414803a2f65","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"}],"url":"https://git.kernel.org/stable/c/e0472947bead3af94cc968ce35fc0414803a2f65"},{"reference_url":"https://git.kernel.org/stable/c/e75485fc589ec729cc182aa9b41dfb6c15ae6f6e","reference_id":"e75485fc589ec729cc182aa9b41dfb6c15ae6f6e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:50Z/"}],"url":"https://git.kernel.org/stable/c/e75485fc589ec729cc182aa9b41dfb6c15ae6f6e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49752"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qcbg-g6j5-zybp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65632?format=json","vulnerability_id":"VCID-qdc8-tftu-afcw","summary":"kernel: Linux kernel: Denial of Service in mlx5e due to incorrect encap attribute handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54074.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54074","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425019","reference_id":"2425019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54074"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdc8-tftu-afcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78522?format=json","vulnerability_id":"VCID-qe58-bb5y-u7ax","summary":"kernel: Spectre v2 SMT mitigations problem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1998","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2235","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23953","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2936","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29438","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2938","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187257","reference_id":"2187257","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187257"},{"reference_url":"https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_id":"#6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d"},{"reference_url":"https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_id":"6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt","reference_id":"CVE-2023-1998","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt"},{"reference_url":"https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx","reference_id":"GHSA-mj4w-6495-6crx","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3810","reference_id":"RHSA-2024:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3810"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6171-1/","reference_id":"USN-6171-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6171-1/"},{"reference_url":"https://usn.ubuntu.com/6172-1/","reference_id":"USN-6172-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6172-1/"},{"reference_url":"https://usn.ubuntu.com/6185-1/","reference_id":"USN-6185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6185-1/"},{"reference_url":"https://usn.ubuntu.com/6187-1/","reference_id":"USN-6187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6187-1/"},{"reference_url":"https://usn.ubuntu.com/6207-1/","reference_id":"USN-6207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6207-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6223-1/","reference_id":"USN-6223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6223-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1998"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qe58-bb5y-u7ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65260?format=json","vulnerability_id":"VCID-qeyu-gh4a-bbcb","summary":"kernel: NFSD: Finish converting the NFSv2 GETACL result encoder","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50861.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50861","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50861"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426034","reference_id":"2426034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50861"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyu-gh4a-bbcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73455?format=json","vulnerability_id":"VCID-qjze-fde3-v7eq","summary":"kernel: ixgbevf: Fix resource leak in ixgbevf_init_module()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49028.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49028","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03701","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0369","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03695","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0358","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03494","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03627","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320673","reference_id":"2320673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320673"},{"reference_url":"https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a","reference_id":"7109e941099244cc876a4b3cb7a3ec79f104374a","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"}],"url":"https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a"},{"reference_url":"https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181","reference_id":"8cfa238a48f34038464b99d0b4825238c2687181","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"}],"url":"https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181"},{"reference_url":"https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2","reference_id":"c99671d4699dcf90d6939923c8fe8a8918e140b2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"}],"url":"https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2"},{"reference_url":"https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d","reference_id":"f166c62cad798c53300b4b327e44300c73ec492d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:11:38Z/"}],"url":"https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49028"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjze-fde3-v7eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67268?format=json","vulnerability_id":"VCID-qmt9-fadf-h3gs","summary":"kernel: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53466.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53466","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400700","reference_id":"2400700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53466"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmt9-fadf-h3gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65748?format=json","vulnerability_id":"VCID-qq5x-xmtg-t7hd","summary":"kernel: fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50778.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50778","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50778"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425136","reference_id":"2425136","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50778"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qq5x-xmtg-t7hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67682?format=json","vulnerability_id":"VCID-qqz8-a63y-jydg","summary":"kernel: drm/client: Fix memory leak in drm_client_modeset_probe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53288.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53288","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02489","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02488","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53288"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1369d0c586ad44f2d18fe2f4cbc5bcb24132fa71","reference_id":"1369d0c586ad44f2d18fe2f4cbc5bcb24132fa71","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/1369d0c586ad44f2d18fe2f4cbc5bcb24132fa71"},{"reference_url":"https://git.kernel.org/stable/c/2329cc7a101af1a844fbf706c0724c0baea38365","reference_id":"2329cc7a101af1a844fbf706c0724c0baea38365","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/2329cc7a101af1a844fbf706c0724c0baea38365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395665","reference_id":"2395665","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395665"},{"reference_url":"https://git.kernel.org/stable/c/5d580017bdb9b3e930b6009e467e5e1589f8ca8a","reference_id":"5d580017bdb9b3e930b6009e467e5e1589f8ca8a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/5d580017bdb9b3e930b6009e467e5e1589f8ca8a"},{"reference_url":"https://git.kernel.org/stable/c/5f2a12f64347f535c6ef55fa7eb36a2874d69b59","reference_id":"5f2a12f64347f535c6ef55fa7eb36a2874d69b59","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/5f2a12f64347f535c6ef55fa7eb36a2874d69b59"},{"reference_url":"https://git.kernel.org/stable/c/8108a494639e56aea77e7196a1d6ea89792b9d4a","reference_id":"8108a494639e56aea77e7196a1d6ea89792b9d4a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/8108a494639e56aea77e7196a1d6ea89792b9d4a"},{"reference_url":"https://git.kernel.org/stable/c/917bef37cfaca07781c6fbaf6cd9404d27e64e6f","reference_id":"917bef37cfaca07781c6fbaf6cd9404d27e64e6f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:10:17Z/"}],"url":"https://git.kernel.org/stable/c/917bef37cfaca07781c6fbaf6cd9404d27e64e6f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-53288"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqz8-a63y-jydg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71079?format=json","vulnerability_id":"VCID-qrcn-gz7d-33fc","summary":"kernel: mm/mempolicy: fix mpol_new leak in shared_policy_replace","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49080.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49080","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08939","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00634","published_at":"2026-05-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0065","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00655","published_at":"2026-05-05T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00652","published_at":"2026-05-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00638","published_at":"2026-05-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00571","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00604","published_at":"2026-04-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00606","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00599","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00605","published_at":"2026-04-18T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00647","published_at":"2026-05-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00645","published_at":"2026-04-24T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00648","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00734","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00733","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00724","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49080"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347644","reference_id":"2347644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49080"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcn-gz7d-33fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65463?format=json","vulnerability_id":"VCID-qs5p-ey6g-vkhr","summary":"kernel: Linux kernel: Memory leak in ath11k Wi-Fi driver leads to Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54275.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54275.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54275","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54275"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426243","reference_id":"2426243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54275"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs5p-ey6g-vkhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69855?format=json","vulnerability_id":"VCID-qt3j-m3ww-33bu","summary":"kernel: igb: revert rtnl_lock() that causes deadlock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53060.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53060","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15107","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15079","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363748","reference_id":"2363748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53060"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3j-m3ww-33bu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67979?format=json","vulnerability_id":"VCID-qvme-7b38-xbd1","summary":"kernel: Linux kernel: Memory leak in driver core location can lead to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53211.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53211","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0228","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02296","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02281","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0d150f967e8410e1e6712484543eec709356a65d","reference_id":"0d150f967e8410e1e6712484543eec709356a65d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"}],"url":"https://git.kernel.org/stable/c/0d150f967e8410e1e6712484543eec709356a65d"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395422","reference_id":"2395422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395422"},{"reference_url":"https://git.kernel.org/stable/c/5a9de90951bbeaed775e4b8d1b16b4d359e82bf5","reference_id":"5a9de90951bbeaed775e4b8d1b16b4d359e82bf5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"}],"url":"https://git.kernel.org/stable/c/5a9de90951bbeaed775e4b8d1b16b4d359e82bf5"},{"reference_url":"https://git.kernel.org/stable/c/8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90","reference_id":"8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:36Z/"}],"url":"https://git.kernel.org/stable/c/8fe72b8f59f63ca776bb8a4fcd2f406057a9fc90"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53211"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvme-7b38-xbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78780?format=json","vulnerability_id":"VCID-qx5q-yc33-huhs","summary":"Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23455","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07496","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07497","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0748","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08447","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0836","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332","reference_id":"2168332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b","reference_id":"?id=a2965c7be0522eaa18808684b7b82b248515511b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"},{"reference_url":"https://usn.ubuntu.com/6072-1/","reference_id":"USN-6072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6072-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23455"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5q-yc33-huhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65645?format=json","vulnerability_id":"VCID-qzjj-xut2-hfcd","summary":"kernel: usb: idmouse: fix an uninit-value in idmouse_open","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50733.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50733","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425032","reference_id":"2425032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50733"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzjj-xut2-hfcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69899?format=json","vulnerability_id":"VCID-r3u8-3w6a-eqh1","summary":"kernel: drm/amd/display: Do not set DRR on pipe Commit","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53042.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53042","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363793","reference_id":"2363793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53042"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3u8-3w6a-eqh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78561?format=json","vulnerability_id":"VCID-r51v-h1rb-qqdr","summary":"kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33203","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04659","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04695","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04739","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04745","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04458","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667","reference_id":"2192667","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9","reference_id":"ChangeLog-6.2.9","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75","reference_id":"?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1210685","reference_id":"show_bug.cgi?id=1210685","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1210685"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"}],"fixed_packages":[],"aliases":["CVE-2023-33203"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r51v-h1rb-qqdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78609?format=json","vulnerability_id":"VCID-renx-7s4p-puaa","summary":"kernel: Use after free bug in r592_remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3141","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00718","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0081","published_at":"2026-05-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00792","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00791","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00787","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00781","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00775","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00777","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00825","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00828","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00829","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00826","published_at":"2026-05-05T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00824","published_at":"2026-05-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00819","published_at":"2026-05-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00816","published_at":"2026-05-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00715","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199","reference_id":"2213199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4","reference_id":"ChangeLog-6.3.4","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7","reference_id":"?id=63264422785021704c39b38f65a78ab9e4a186d7","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0004/","reference_id":"ntap-20230706-0004","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/","reference_id":"t","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6252-1/","reference_id":"USN-6252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6252-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6260-1/","reference_id":"USN-6260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6260-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3141"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-renx-7s4p-puaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67602?format=json","vulnerability_id":"VCID-rhs7-avgn-e7dr","summary":"kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50412.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50412","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03159","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04529","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0453","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04532","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50412"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396530","reference_id":"2396530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396530"},{"reference_url":"https://git.kernel.org/stable/c/3747465c5da7a11957a34bbb9485d9fc253b91cc","reference_id":"3747465c5da7a11957a34bbb9485d9fc253b91cc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"}],"url":"https://git.kernel.org/stable/c/3747465c5da7a11957a34bbb9485d9fc253b91cc"},{"reference_url":"https://git.kernel.org/stable/c/40cdb02cb9f965732eb543d47f15bef8d10f0f5f","reference_id":"40cdb02cb9f965732eb543d47f15bef8d10f0f5f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"}],"url":"https://git.kernel.org/stable/c/40cdb02cb9f965732eb543d47f15bef8d10f0f5f"},{"reference_url":"https://git.kernel.org/stable/c/4d4d5bc659206b187263190ad9a03513f625659d","reference_id":"4d4d5bc659206b187263190ad9a03513f625659d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"}],"url":"https://git.kernel.org/stable/c/4d4d5bc659206b187263190ad9a03513f625659d"},{"reference_url":"https://git.kernel.org/stable/c/86ae5170786aea3e1751123ca55700fb9b37b623","reference_id":"86ae5170786aea3e1751123ca55700fb9b37b623","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"}],"url":"https://git.kernel.org/stable/c/86ae5170786aea3e1751123ca55700fb9b37b623"},{"reference_url":"https://git.kernel.org/stable/c/f369fb4deed7ab997cfa703dc85ec08b3adc1af8","reference_id":"f369fb4deed7ab997cfa703dc85ec08b3adc1af8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:09:15Z/"}],"url":"https://git.kernel.org/stable/c/f369fb4deed7ab997cfa703dc85ec08b3adc1af8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50412"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhs7-avgn-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70731?format=json","vulnerability_id":"VCID-rkwq-es68-cbev","summary":"kernel: drm/amdkfd: Add sync after creating vram bo","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53009.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53009","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02819","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02776","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02813","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0282","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25334","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53009"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355526","reference_id":"2355526","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53009"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rkwq-es68-cbev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69827?format=json","vulnerability_id":"VCID-rmxs-29pj-8qbu","summary":"kernel: ice: xsk: disable txq irq before flushing hw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53102.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53102","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19391","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19387","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363719","reference_id":"2363719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53102"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmxs-29pj-8qbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66248?format=json","vulnerability_id":"VCID-rp47-hypa-7ubz","summary":"kernel: media: dvb-usb: fix memory leak in dvb_usb_adapter_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50626.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50626","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11995","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11937","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11991","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11967","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19866","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419873","reference_id":"2419873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50626"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rp47-hypa-7ubz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67055?format=json","vulnerability_id":"VCID-rwug-pkf1-9kbb","summary":"kernel: drm/amd/display: Fix potential null-deref in dm_resume","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50535.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50535","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402308","reference_id":"2402308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50535"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwug-pkf1-9kbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69813?format=json","vulnerability_id":"VCID-rxc4-gznc-ubh9","summary":"kernel: scsi: mpi3mr: Fix sas_hba.phy memory leak in mpi3mr_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53126.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53126","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53126"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363703","reference_id":"2363703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53126"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxc4-gznc-ubh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65618?format=json","vulnerability_id":"VCID-ry3f-q2fp-j3c5","summary":"kernel: Linux kernel: Denial of Service due to PCI device reference count leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50718.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50718","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425005","reference_id":"2425005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50718"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ry3f-q2fp-j3c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78678?format=json","vulnerability_id":"VCID-ryhg-z4qf-kyd6","summary":"kernel: hid: Use After Free in asus_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1079","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04312","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06558","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06458","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06533","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06546","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444","reference_id":"2173444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df","reference_id":"?id=4ab3a086d10eeec1424f2e8a968827a6336203df","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6171-1/","reference_id":"USN-6171-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6171-1/"},{"reference_url":"https://usn.ubuntu.com/6172-1/","reference_id":"USN-6172-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6172-1/"},{"reference_url":"https://usn.ubuntu.com/6185-1/","reference_id":"USN-6185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6185-1/"},{"reference_url":"https://usn.ubuntu.com/6187-1/","reference_id":"USN-6187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6187-1/"},{"reference_url":"https://usn.ubuntu.com/6207-1/","reference_id":"USN-6207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6207-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6223-1/","reference_id":"USN-6223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6223-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6604-1/","reference_id":"USN-6604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-1/"},{"reference_url":"https://usn.ubuntu.com/6604-2/","reference_id":"USN-6604-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-2/"}],"fixed_packages":[],"aliases":["CVE-2023-1079"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ryhg-z4qf-kyd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67663?format=json","vulnerability_id":"VCID-s3kp-f5zp-zfhn","summary":"kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50356.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50356","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04236","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396152","reference_id":"2396152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396152"},{"reference_url":"https://git.kernel.org/stable/c/2a3fc78210b9f0e85372a2435368962009f480fc","reference_id":"2a3fc78210b9f0e85372a2435368962009f480fc","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"}],"url":"https://git.kernel.org/stable/c/2a3fc78210b9f0e85372a2435368962009f480fc"},{"reference_url":"https://git.kernel.org/stable/c/723399af2795fb95687a531c9480464b5f489333","reference_id":"723399af2795fb95687a531c9480464b5f489333","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"}],"url":"https://git.kernel.org/stable/c/723399af2795fb95687a531c9480464b5f489333"},{"reference_url":"https://git.kernel.org/stable/c/c2e1e59d59fafe297779ceae1fe0e6fbebc3e745","reference_id":"c2e1e59d59fafe297779ceae1fe0e6fbebc3e745","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"}],"url":"https://git.kernel.org/stable/c/c2e1e59d59fafe297779ceae1fe0e6fbebc3e745"},{"reference_url":"https://git.kernel.org/stable/c/ded86c4191a3c17f8200d17a7d8a6f63b74554ae","reference_id":"ded86c4191a3c17f8200d17a7d8a6f63b74554ae","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:32:08Z/"}],"url":"https://git.kernel.org/stable/c/ded86c4191a3c17f8200d17a7d8a6f63b74554ae"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23947","reference_id":"RHSA-2025:23947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23960","reference_id":"RHSA-2025:23960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23960"}],"fixed_packages":[],"aliases":["CVE-2022-50356"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3kp-f5zp-zfhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78700?format=json","vulnerability_id":"VCID-s4uv-qjv6-n7b8","summary":"kernel: net/tls: tls_is_tx_ready() checked list_entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1075","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01198","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01213","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01207","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01205","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01201","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00868","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00857","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00864","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0087","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434","reference_id":"2173434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb","reference_id":"?id=ffe2a22562444720b05bdfeb999c03e810d84cbb","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:05:50Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1075"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s4uv-qjv6-n7b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78679?format=json","vulnerability_id":"VCID-sa68-r3bd-jkcs","summary":"kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1118","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04326","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04499","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04536","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04538","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174400","reference_id":"2174400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1653","reference_id":"RHSA-2024:1653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3810","reference_id":"RHSA-2024:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3810"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"},{"reference_url":"https://usn.ubuntu.com/6032-1/","reference_id":"USN-6032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6032-1/"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6081-1/","reference_id":"USN-6081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6081-1/"},{"reference_url":"https://usn.ubuntu.com/6084-1/","reference_id":"USN-6084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6084-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6092-1/","reference_id":"USN-6092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6092-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6095-1/","reference_id":"USN-6095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6095-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1118"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sa68-r3bd-jkcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69791?format=json","vulnerability_id":"VCID-sak6-57cj-v3e6","summary":"kernel: scsi: mpi3mr: Fix config page DMA memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53120.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53120","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363681","reference_id":"2363681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53120"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sak6-57cj-v3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66284?format=json","vulnerability_id":"VCID-sd5x-98z1-e7at","summary":"kernel: drm/amd/display: fix mapping to non-allocated address","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53753.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53753","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53753"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419927","reference_id":"2419927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53753"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sd5x-98z1-e7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69807?format=json","vulnerability_id":"VCID-sg32-q283-3fhn","summary":"kernel: net/mlx5: E-Switch, Fix an Oops in error handling code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53058.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53058","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15491","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15233","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15361","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29487","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29528","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29486","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363697","reference_id":"2363697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53058"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sg32-q283-3fhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70724?format=json","vulnerability_id":"VCID-sj54-tay9-t3f3","summary":"kernel: usb: typec: ucsi: Don't attempt to resume the ports before they exist","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52938.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52938","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01667","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01673","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01675","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08356","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10552","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52938"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355518","reference_id":"2355518","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355518"},{"reference_url":"https://git.kernel.org/stable/c/f82060da749c611ed427523b6d1605d87338aac1","reference_id":"f82060da749c611ed427523b6d1605d87338aac1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:59Z/"}],"url":"https://git.kernel.org/stable/c/f82060da749c611ed427523b6d1605d87338aac1"},{"reference_url":"https://git.kernel.org/stable/c/fdd11d7136fd070b3a74d6d8799d9eac28a57fc5","reference_id":"fdd11d7136fd070b3a74d6d8799d9eac28a57fc5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:24:59Z/"}],"url":"https://git.kernel.org/stable/c/fdd11d7136fd070b3a74d6d8799d9eac28a57fc5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52938"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sj54-tay9-t3f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78556?format=json","vulnerability_id":"VCID-ss41-s8fw-xub6","summary":"kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28772","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4368","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43712","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43649","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46503","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46617","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330","reference_id":"2181330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"}],"fixed_packages":[],"aliases":["CVE-2023-28772"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ss41-s8fw-xub6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65592?format=json","vulnerability_id":"VCID-sw38-8vjt-bbdg","summary":"kernel: Linux kernel: Denial of Service due to memory leak in rtl8xxxu Wi-Fi driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54036.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54036","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424977","reference_id":"2424977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54036"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sw38-8vjt-bbdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70671?format=json","vulnerability_id":"VCID-swr7-u5sj-yffz","summary":"kernel: RDMA/core: Fix ib block iterator counter overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53026.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53026","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01772","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01789","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02007","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05953","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05819","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0afec5e9cea732cb47014655685a2a47fb180c31","reference_id":"0afec5e9cea732cb47014655685a2a47fb180c31","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"}],"url":"https://git.kernel.org/stable/c/0afec5e9cea732cb47014655685a2a47fb180c31"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355457","reference_id":"2355457","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355457"},{"reference_url":"https://git.kernel.org/stable/c/362c9489720b31b6aa7491423ba65a4e98aa9838","reference_id":"362c9489720b31b6aa7491423ba65a4e98aa9838","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"}],"url":"https://git.kernel.org/stable/c/362c9489720b31b6aa7491423ba65a4e98aa9838"},{"reference_url":"https://git.kernel.org/stable/c/43811d07ea64366af8ec9e168c558ec51440c39e","reference_id":"43811d07ea64366af8ec9e168c558ec51440c39e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"}],"url":"https://git.kernel.org/stable/c/43811d07ea64366af8ec9e168c558ec51440c39e"},{"reference_url":"https://git.kernel.org/stable/c/902063a9fea5f8252df392ade746bc9cfd07a5ae","reference_id":"902063a9fea5f8252df392ade746bc9cfd07a5ae","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"}],"url":"https://git.kernel.org/stable/c/902063a9fea5f8252df392ade746bc9cfd07a5ae"},{"reference_url":"https://git.kernel.org/stable/c/d66c1d4178c219b6e7d7a6f714e3e3656faccc36","reference_id":"d66c1d4178c219b6e7d7a6f714e3e3656faccc36","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:18:44Z/"}],"url":"https://git.kernel.org/stable/c/d66c1d4178c219b6e7d7a6f714e3e3656faccc36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53026"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swr7-u5sj-yffz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65346?format=json","vulnerability_id":"VCID-swwx-5jbc-n7da","summary":"kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54300.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54300","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15215","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426122","reference_id":"2426122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54300"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swwx-5jbc-n7da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69894?format=json","vulnerability_id":"VCID-sx8u-athb-sbea","summary":"kernel: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53112.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53112","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16289","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16351","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16012","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16087","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1612","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363788","reference_id":"2363788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53112"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sx8u-athb-sbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78980?format=json","vulnerability_id":"VCID-t81u-wyws-r7c3","summary":"kernel: Rate limit overflow messages in r8152 in intr_callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3594","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41751","published_at":"2026-05-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42115","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41869","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41728","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41813","published_at":"2026-05-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024","reference_id":"2149024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211363","reference_id":"?id.211363","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://vuldb.com/?id.211363"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907","reference_id":"?id=93e2be344a7db169b7119de21ac1bf253b8c6907","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67515?format=json","vulnerability_id":"VCID-ta4g-cdfd-w7fv","summary":"kernel: sctp: fix a potential overflow in sctp_ifwdtsn_skip","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53372","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53372"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396405","reference_id":"2396405","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396405"},{"reference_url":"https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649","reference_id":"32832a2caf82663870126c5186cf8f86c8b2a649","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649"},{"reference_url":"https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4","reference_id":"4fbd094d4131a10d06a45d64158567052a35b3f4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4"},{"reference_url":"https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57","reference_id":"5c9367ac5a22d71841bcd00130f9146c9b227d57","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57"},{"reference_url":"https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f","reference_id":"6109f5b13ce3e3e537db6f18976ec0e9118d1c6f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f"},{"reference_url":"https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5","reference_id":"79b28f42214a3d0d6a8c514db3602260bd5d6cb5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5"},{"reference_url":"https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7","reference_id":"ad831a7079c99c01e801764b53bc9997c2e9c0f7","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7"},{"reference_url":"https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73","reference_id":"ad988e9b5ff04607e624a459209e8c2d0c15fc73","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:53:52Z/"}],"url":"https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"}],"fixed_packages":[],"aliases":["CVE-2023-53372"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ta4g-cdfd-w7fv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65677?format=json","vulnerability_id":"VCID-tdrv-18j7-t3h3","summary":"kernel: wifi: mt76: do not run mt76u_status_worker if the device is not running","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50735.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50735.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50735","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50735"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425064","reference_id":"2425064","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50735"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdrv-18j7-t3h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65731?format=json","vulnerability_id":"VCID-tewn-u963-j3ar","summary":"kernel: Linux kernel: Denial of Service in ath9k Wi-Fi driver due to URB memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50740.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50740","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425119","reference_id":"2425119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50740"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tewn-u963-j3ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67287?format=json","vulnerability_id":"VCID-thw5-hvm8-j7f4","summary":"kernel: Linux kernel: Denial of Service via malicious MTU negotiation in TIPC","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53517.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53517","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400721","reference_id":"2400721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53517"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thw5-hvm8-j7f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4357?format=json","vulnerability_id":"VCID-trxm-8mg3-4bbr","summary":"x86/Intel: Gather Data Sampling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982","reference_id":"","reference_type":"","scores":[{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72854","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72829","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72842","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72818","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.75003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74957","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74952","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305","reference_id":"1043305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949","reference_id":"2223949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"reference_url":"https://access.redhat.com/solutions/7027704","reference_id":"7027704","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://access.redhat.com/solutions/7027704"},{"reference_url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/","reference_id":"AWS-2023-007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"},{"reference_url":"https://downfall.page","reference_id":"downfall.page","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://downfall.page"},{"reference_url":"https://www.debian.org/security/2023/dsa-5474","reference_id":"dsa-5474","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5474"},{"reference_url":"https://www.debian.org/security/2023/dsa-5475","reference_id":"dsa-5475","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5475"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","reference_id":"HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","reference_id":"HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html","reference_id":"intel-sa-00828.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230811-0001/","reference_id":"ntap-20230811-0001","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230811-0001/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","reference_id":"OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3319","reference_id":"RHSA-2024:3319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3319"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","reference_id":"T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"reference_url":"https://usn.ubuntu.com/6286-1/","reference_id":"USN-6286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6286-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6316-1/","reference_id":"USN-6316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6316-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-435.html","reference_id":"XSA-435","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://xenbits.xen.org/xsa/advisory-435.html"}],"fixed_packages":[],"aliases":["CVE-2022-40982","XSA-435"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66800?format=json","vulnerability_id":"VCID-tthu-26he-c3bw","summary":"kernel: tpm: acpi: Call acpi_put_table() to fix memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50562.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50562","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08306","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08459","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08543","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50562"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405754","reference_id":"2405754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50562"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tthu-26he-c3bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65678?format=json","vulnerability_id":"VCID-u8nd-e8ar-xufr","summary":"kernel: Linux kernel: Denial of Service in s390/lcs network driver due to incompatible function pointer type","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50728.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50728.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50728","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425065","reference_id":"2425065","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50728"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8nd-e8ar-xufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67626?format=json","vulnerability_id":"VCID-uahv-ngwf-2fg1","summary":"kernel: drm/vkms: Fix null-ptr-deref in vkms_release()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50369.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50369.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50369","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03977","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50369"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0b8f390e2251191f1b179cc87f65d54c96565f0d","reference_id":"0b8f390e2251191f1b179cc87f65d54c96565f0d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"}],"url":"https://git.kernel.org/stable/c/0b8f390e2251191f1b179cc87f65d54c96565f0d"},{"reference_url":"https://git.kernel.org/stable/c/1f9836f95271e7acf016667eee0aeae3386f9645","reference_id":"1f9836f95271e7acf016667eee0aeae3386f9645","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"}],"url":"https://git.kernel.org/stable/c/1f9836f95271e7acf016667eee0aeae3386f9645"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396112","reference_id":"2396112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396112"},{"reference_url":"https://git.kernel.org/stable/c/2fe2a8f40c21161ffe7653cc234e7934db5b7cc5","reference_id":"2fe2a8f40c21161ffe7653cc234e7934db5b7cc5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"}],"url":"https://git.kernel.org/stable/c/2fe2a8f40c21161ffe7653cc234e7934db5b7cc5"},{"reference_url":"https://git.kernel.org/stable/c/57031c474c3a920ea73afeb5dc352e537f5793ee","reference_id":"57031c474c3a920ea73afeb5dc352e537f5793ee","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"}],"url":"https://git.kernel.org/stable/c/57031c474c3a920ea73afeb5dc352e537f5793ee"},{"reference_url":"https://git.kernel.org/stable/c/596f1ba3987e601e31a5abf1f75ce1d2635aceac","reference_id":"596f1ba3987e601e31a5abf1f75ce1d2635aceac","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:35:42Z/"}],"url":"https://git.kernel.org/stable/c/596f1ba3987e601e31a5abf1f75ce1d2635aceac"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13960","reference_id":"RHSA-2025:13960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13961","reference_id":"RHSA-2025:13961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"}],"fixed_packages":[],"aliases":["CVE-2022-50369"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uahv-ngwf-2fg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78236?format=json","vulnerability_id":"VCID-ubr3-74hm-e7hy","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4207","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07526","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07459","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07527","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07511","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13118","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13338","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4207"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubr3-74hm-e7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78682?format=json","vulnerability_id":"VCID-uc3a-36wc-n3bt","summary":"kernel: smsusb: use-after-free caused by do_submit_urb()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4132","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01534","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01542","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03593","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03637","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03574","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707","reference_id":"2221707","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4132","reference_id":"CVE-2023-4132","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"},{"reference_url":"https://usn.ubuntu.com/6464-1/","reference_id":"USN-6464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6464-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"},{"reference_url":"https://usn.ubuntu.com/6701-1/","reference_id":"USN-6701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-1/"},{"reference_url":"https://usn.ubuntu.com/6701-2/","reference_id":"USN-6701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-2/"},{"reference_url":"https://usn.ubuntu.com/6701-3/","reference_id":"USN-6701-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-3/"},{"reference_url":"https://usn.ubuntu.com/6701-4/","reference_id":"USN-6701-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-4/"}],"fixed_packages":[],"aliases":["CVE-2023-4132"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uc3a-36wc-n3bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66116?format=json","vulnerability_id":"VCID-udw2-zd4k-jbf8","summary":"kernel: drm/amdkfd: fix potential kgd_mem UAFs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53816.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53816","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53816"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420281","reference_id":"2420281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53816"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udw2-zd4k-jbf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70040?format=json","vulnerability_id":"VCID-ued9-gub9-hyfg","summary":"kernel: drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49827.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49827","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15813","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16024","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16033","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49827"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363409","reference_id":"2363409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49827"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ued9-gub9-hyfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65445?format=json","vulnerability_id":"VCID-uf9u-jb8t-g7az","summary":"kernel: ipv6: ensure sane device mtu in tunnels","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50816.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50816","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50816"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426225","reference_id":"2426225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50816"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf9u-jb8t-g7az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69793?format=json","vulnerability_id":"VCID-ufc1-327r-h3es","summary":"kernel: wifi: nl80211: fix NULL-ptr deref in offchan check","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53113.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53113","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363683","reference_id":"2363683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53113"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ufc1-327r-h3es"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78758?format=json","vulnerability_id":"VCID-uhue-acky-4ye7","summary":"kernel: HID: check empty report_list in hid_validate_values()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1073","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06226","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06301","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06319","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06326","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06048","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/2","reference_id":"2","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403","reference_id":"2173403","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403"},{"reference_url":"https://www.openwall.com/lists/osssecurity/2023/01/17/3","reference_id":"3","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://www.openwall.com/lists/osssecurity/2023/01/17/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/3","reference_id":"3","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/3"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456","reference_id":"id=b12fece4c64857e5fab4290bf01b2e0317a88456","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6174-1/","reference_id":"USN-6174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6174-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1073"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhue-acky-4ye7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70678?format=json","vulnerability_id":"VCID-uneq-436k-jyb3","summary":"kernel: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52997.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52997","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03833","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03829","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04959","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04915","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24729","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355468","reference_id":"2355468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52997"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uneq-436k-jyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67346?format=json","vulnerability_id":"VCID-uq2c-d4y3-mqeg","summary":"kernel: net: sched: cake: fix null pointer access issue when cake_init() fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50452.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50452.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50452","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50452"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50452","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50452"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400781","reference_id":"2400781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50452"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uq2c-d4y3-mqeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65584?format=json","vulnerability_id":"VCID-uqyg-b1t9-guf3","summary":"kernel: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50699.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50699.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50699","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424969","reference_id":"2424969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50699"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqyg-b1t9-guf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70669?format=json","vulnerability_id":"VCID-urmf-rw6a-kudw","summary":"kernel: drm/i915: Avoid potential vm use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52931.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52931.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52931","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08824","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08911","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08909","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08732","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.089","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08853","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15952","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15842","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15918","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22601","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52931"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355455","reference_id":"2355455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355455"},{"reference_url":"https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d","reference_id":"41d419382ec7e257e54b7b6ff0d3623aafb1316d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:22:44Z/"}],"url":"https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d"},{"reference_url":"https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00","reference_id":"764accc2c1b8fd1507be2e7f436c94cdce887a00","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:22:44Z/"}],"url":"https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52931"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-urmf-rw6a-kudw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65425?format=json","vulnerability_id":"VCID-us8q-fx2p-wugu","summary":"kernel: wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50881.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50881","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426203","reference_id":"2426203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50881"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-us8q-fx2p-wugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78338?format=json","vulnerability_id":"VCID-uswu-w3g7-9ybk","summary":"kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35824","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01117","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01122","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00953","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00933","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00937","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00949","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00945","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00934","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/","reference_id":"20230318081506.795147-1-zyytlz.wz%40163.com","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215836","reference_id":"2215836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215836"},{"reference_url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/","reference_id":"49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a","reference_id":"?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230803-0002/","reference_id":"ntap-20230803-0002","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230803-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-35824"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uswu-w3g7-9ybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70718?format=json","vulnerability_id":"VCID-uvrw-52kq-43hr","summary":"kernel: HV: hv_balloon: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52937.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52937.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52937","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10371","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10327","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10318","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10264","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11537","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52937"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0b570a059cf42ad6e2eb632f47c23813d58d8303","reference_id":"0b570a059cf42ad6e2eb632f47c23813d58d8303","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:25:04Z/"}],"url":"https://git.kernel.org/stable/c/0b570a059cf42ad6e2eb632f47c23813d58d8303"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355512","reference_id":"2355512","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355512"},{"reference_url":"https://git.kernel.org/stable/c/6dfb0771429a63db8561d44147f2bb76f93e1c86","reference_id":"6dfb0771429a63db8561d44147f2bb76f93e1c86","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:25:04Z/"}],"url":"https://git.kernel.org/stable/c/6dfb0771429a63db8561d44147f2bb76f93e1c86"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52937"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uvrw-52kq-43hr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70661?format=json","vulnerability_id":"VCID-uwqz-xtub-4qes","summary":"kernel: drm/i915: Fix a memory leak with reused mmap_offset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53002.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53002","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08356","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10783","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10756","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10687","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10741","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19864","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53002"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0220e4fe178c3390eb0291cdb34912d66972db8a","reference_id":"0220e4fe178c3390eb0291cdb34912d66972db8a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:10Z/"}],"url":"https://git.kernel.org/stable/c/0220e4fe178c3390eb0291cdb34912d66972db8a"},{"reference_url":"https://git.kernel.org/stable/c/0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb","reference_id":"0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:10Z/"}],"url":"https://git.kernel.org/stable/c/0bdc4b4ba7206c452ee81c82fa66e39d0e1780fb"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355447","reference_id":"2355447","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53002"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uwqz-xtub-4qes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66798?format=json","vulnerability_id":"VCID-uy57-56un-h7hp","summary":"kernel: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53710.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53710","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06449","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06574","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06595","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06789","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06812","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405752","reference_id":"2405752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53710"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uy57-56un-h7hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69876?format=json","vulnerability_id":"VCID-v3kc-8f22-gfff","summary":"kernel: net/iucv: Fix size of interrupt data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53108.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53108","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15825","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15713","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1561","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15692","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15728","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363769","reference_id":"2363769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53108"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3kc-8f22-gfff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65441?format=json","vulnerability_id":"VCID-v3v2-h1eu-hfdt","summary":"kernel: tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50824.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50824","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426221","reference_id":"2426221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50824"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3v2-h1eu-hfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67041?format=json","vulnerability_id":"VCID-vbk3-2zss-xqbw","summary":"kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53675.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53675","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402293","reference_id":"2402293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0532","reference_id":"RHSA-2026:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0533","reference_id":"RHSA-2026:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0534","reference_id":"RHSA-2026:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0535","reference_id":"RHSA-2026:0535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0536","reference_id":"RHSA-2026:0536","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0537","reference_id":"RHSA-2026:0537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0576","reference_id":"RHSA-2026:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0643","reference_id":"RHSA-2026:0643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0754","reference_id":"RHSA-2026:0754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0755","reference_id":"RHSA-2026:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0755"}],"fixed_packages":[],"aliases":["CVE-2023-53675"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbk3-2zss-xqbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66162?format=json","vulnerability_id":"VCID-vc5c-fmue-3fc6","summary":"kernel: ASoC: soc-compress: Reposition and add pcm_mutex","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53866.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53866","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420336","reference_id":"2420336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53866"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vc5c-fmue-3fc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67371?format=json","vulnerability_id":"VCID-vcqz-n7gh-8ubz","summary":"kernel: scsi: mpt3sas: Fix a memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53512.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53512","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04193","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400806","reference_id":"2400806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53512"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vcqz-n7gh-8ubz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66997?format=json","vulnerability_id":"VCID-vczs-dhkw-jbed","summary":"kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53639.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53639","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53639"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402248","reference_id":"2402248","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53639"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vczs-dhkw-jbed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66168?format=json","vulnerability_id":"VCID-vczs-zdyv-bkaa","summary":"kernel: drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50667.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50667","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420343","reference_id":"2420343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50667"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vczs-zdyv-bkaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67322?format=json","vulnerability_id":"VCID-vdnm-hzq9-rfh8","summary":"kernel: wifi: ath11k: fix deinitialization of firmware resources","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53532.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53532.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53532","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53532"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400756","reference_id":"2400756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53532"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdnm-hzq9-rfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67993?format=json","vulnerability_id":"VCID-ve64-7aw3-gych","summary":"kernel: drm/bridge: megachips: Fix a null pointer dereference bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50317.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50317","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395436","reference_id":"2395436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50317"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ve64-7aw3-gych"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70658?format=json","vulnerability_id":"VCID-vegv-pn5p-7uav","summary":"kernel: drm/i915: Fix request ref counting during error capture & debugfs dump","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52981.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52981","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03693","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03687","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25401","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36761","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355444","reference_id":"2355444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-52981"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vegv-pn5p-7uav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69845?format=json","vulnerability_id":"VCID-vfen-6dad-3kbm","summary":"kernel: scsi: mpi3mr: Fix mpi3mr_hba_port memory leak in mpi3mr_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53132.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53132","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53132"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363737","reference_id":"2363737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53132"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vfen-6dad-3kbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67018?format=json","vulnerability_id":"VCID-vgd5-jh9f-6ygx","summary":"kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50544.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50544","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402269","reference_id":"2402269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50544"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vgd5-jh9f-6ygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69867?format=json","vulnerability_id":"VCID-w5zx-eed4-efdw","summary":"kernel: drm/amdkfd: Fix an illegal memory access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53090.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53090","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12484","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12326","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12237","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12375","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1244","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12435","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12461","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363760","reference_id":"2363760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53090"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5zx-eed4-efdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65574?format=json","vulnerability_id":"VCID-wedr-ny2f-1ygy","summary":"kernel: Linux kernel: Denial of Service in ice driver via ethtool reload","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54037.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54037.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54037","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10551","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54037"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424959","reference_id":"2424959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54037"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wedr-ny2f-1ygy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78945?format=json","vulnerability_id":"VCID-wm98-kp5f-mudg","summary":"kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06771","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06774","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08271","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610","reference_id":"2139610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22910","reference_id":"RHSA-2025:22910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22914","reference_id":"RHSA-2025:22914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22914"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/7607-1/","reference_id":"USN-7607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-1/"},{"reference_url":"https://usn.ubuntu.com/7607-2/","reference_id":"USN-7607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-2/"},{"reference_url":"https://usn.ubuntu.com/7607-3/","reference_id":"USN-7607-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-3/"}],"fixed_packages":[],"aliases":["CVE-2022-3640"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65444?format=json","vulnerability_id":"VCID-wnep-c9wf-hycp","summary":"kernel: Linux kernel: Memory leak in RDMA restrack leads to Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50822.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50822","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426224","reference_id":"2426224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"}],"fixed_packages":[],"aliases":["CVE-2022-50822"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnep-c9wf-hycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67598?format=json","vulnerability_id":"VCID-wp3w-8tsh-83gj","summary":"kernel: net/tunnel: wait until all sk_user_data reader finish before releasing the sock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50405.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50405","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03783","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50405"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396526","reference_id":"2396526","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396526"},{"reference_url":"https://git.kernel.org/stable/c/303000c793f705d07b551eb7c1c27001c5b33c8d","reference_id":"303000c793f705d07b551eb7c1c27001c5b33c8d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/303000c793f705d07b551eb7c1c27001c5b33c8d"},{"reference_url":"https://git.kernel.org/stable/c/3cf7203ca620682165706f70a1b12b5194607dce","reference_id":"3cf7203ca620682165706f70a1b12b5194607dce","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/3cf7203ca620682165706f70a1b12b5194607dce"},{"reference_url":"https://git.kernel.org/stable/c/588d0b8462f5ffed3e677e65639825b2678117ab","reference_id":"588d0b8462f5ffed3e677e65639825b2678117ab","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/588d0b8462f5ffed3e677e65639825b2678117ab"},{"reference_url":"https://git.kernel.org/stable/c/84e566d157cc22ad2da8bdd970495855fbf13d92","reference_id":"84e566d157cc22ad2da8bdd970495855fbf13d92","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/84e566d157cc22ad2da8bdd970495855fbf13d92"},{"reference_url":"https://git.kernel.org/stable/c/91f09a776ae335ca836ed864b8f2a9461882a280","reference_id":"91f09a776ae335ca836ed864b8f2a9461882a280","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/91f09a776ae335ca836ed864b8f2a9461882a280"},{"reference_url":"https://git.kernel.org/stable/c/9a6544343bba7da929d6d4a2dc44ec0f15970081","reference_id":"9a6544343bba7da929d6d4a2dc44ec0f15970081","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/9a6544343bba7da929d6d4a2dc44ec0f15970081"},{"reference_url":"https://git.kernel.org/stable/c/b38aa7465411795e9e744b8d94633910497fec2a","reference_id":"b38aa7465411795e9e744b8d94633910497fec2a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/b38aa7465411795e9e744b8d94633910497fec2a"},{"reference_url":"https://git.kernel.org/stable/c/be34e79e0ae6adbf6e7e75ddaee9ad84795ab933","reference_id":"be34e79e0ae6adbf6e7e75ddaee9ad84795ab933","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/be34e79e0ae6adbf6e7e75ddaee9ad84795ab933"},{"reference_url":"https://git.kernel.org/stable/c/e8316584b0a6c61c9c407631040c22712b26e38c","reference_id":"e8316584b0a6c61c9c407631040c22712b26e38c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:07:29Z/"}],"url":"https://git.kernel.org/stable/c/e8316584b0a6c61c9c407631040c22712b26e38c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50405"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp3w-8tsh-83gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66223?format=json","vulnerability_id":"VCID-wpwa-mc4t-3kcw","summary":"kernel: dmaengine: ptdma: check for null desc before calling pt_cmd_callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53755.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53755","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53755"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419836","reference_id":"2419836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53755"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpwa-mc4t-3kcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65461?format=json","vulnerability_id":"VCID-wrtt-y22r-hffw","summary":"kernel: net/mlx5e: TC, Fix using eswitch mapping in nic mode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54216.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54216","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10551","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426241","reference_id":"2426241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54216"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrtt-y22r-hffw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65442?format=json","vulnerability_id":"VCID-wx18-wkfb-wqa9","summary":"kernel: drm: Prevent drm_copy_field() to attempt copying a NULL pointer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50884.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50884","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15215","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50884"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426222","reference_id":"2426222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50884"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wx18-wkfb-wqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79548?format=json","vulnerability_id":"VCID-wxfm-2u2z-euad","summary":"kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0183","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01841","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01858","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091","reference_id":"2073091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"reference_url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_id":"3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/","reference_id":"6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/"},{"reference_url":"https://security.archlinux.org/AVG-2698","reference_id":"AVG-2698","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2698"},{"reference_url":"https://security.archlinux.org/AVG-2699","reference_id":"AVG-2699","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2699"},{"reference_url":"https://security.archlinux.org/AVG-2700","reference_id":"AVG-2700","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2700"},{"reference_url":"https://security.archlinux.org/AVG-2701","reference_id":"AVG-2701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2701"},{"reference_url":"https://www.debian.org/security/2022/dsa-5127","reference_id":"dsa-5127","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5127"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/","reference_id":"LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220513-0001/","reference_id":"ntap-20220513-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220513-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5416-1/","reference_id":"USN-5416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5416-1/"},{"reference_url":"https://usn.ubuntu.com/5469-1/","reference_id":"USN-5469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5469-1/"},{"reference_url":"https://usn.ubuntu.com/5493-1/","reference_id":"USN-5493-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-1/"},{"reference_url":"https://usn.ubuntu.com/5493-2/","reference_id":"USN-5493-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-2/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5539-1/","reference_id":"USN-5539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5539-1/"},{"reference_url":"https://usn.ubuntu.com/5541-1/","reference_id":"USN-5541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5541-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/","reference_id":"XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/"}],"fixed_packages":[],"aliases":["CVE-2022-28388"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65783?format=json","vulnerability_id":"VCID-wxpd-tjfm-ckej","summary":"kernel: drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50750.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50750","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425171","reference_id":"2425171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50750"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxpd-tjfm-ckej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69858?format=json","vulnerability_id":"VCID-wybf-bh7h-yycw","summary":"kernel: thunderbolt: Fix memory leak in margining","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53050.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53050.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53050","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53050"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363751","reference_id":"2363751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53050"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wybf-bh7h-yycw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78505?format=json","vulnerability_id":"VCID-wzfs-19ss-5fav","summary":"kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2269","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06039","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06096","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06111","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06464","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388","reference_id":"2189388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6173-1/","reference_id":"USN-6173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6173-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2269"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzfs-19ss-5fav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65246?format=json","vulnerability_id":"VCID-x88m-6k5m-1qcz","summary":"kernel: Linux kernel: Denial of service in lontium-lt9611 GPU driver due to NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50878.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50878","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426019","reference_id":"2426019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50878"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x88m-6k5m-1qcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65624?format=json","vulnerability_id":"VCID-xen2-vhq4-r7af","summary":"kernel: Linux kernel: Denial of Service in iwlwifi due to NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54053.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54053","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14443","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14535","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425011","reference_id":"2425011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54053"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xen2-vhq4-r7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70079?format=json","vulnerability_id":"VCID-xk73-nkxw-b7ch","summary":"kernel: capabilities: fix potential memleak on error path from vfs_getxattr_alloc()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49890.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49890","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18621","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18716","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18527","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18591","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.19007","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0c3e6288da650d1ec911a259c77bc2d88e498603","reference_id":"0c3e6288da650d1ec911a259c77bc2d88e498603","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/0c3e6288da650d1ec911a259c77bc2d88e498603"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363448","reference_id":"2363448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363448"},{"reference_url":"https://git.kernel.org/stable/c/2de8eec8afb75792440b8900a01d52b8f6742fd1","reference_id":"2de8eec8afb75792440b8900a01d52b8f6742fd1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/2de8eec8afb75792440b8900a01d52b8f6742fd1"},{"reference_url":"https://git.kernel.org/stable/c/6bb00eb21c0fbf18e5d3538c9ff0cf63fd0ace85","reference_id":"6bb00eb21c0fbf18e5d3538c9ff0cf63fd0ace85","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/6bb00eb21c0fbf18e5d3538c9ff0cf63fd0ace85"},{"reference_url":"https://git.kernel.org/stable/c/7480aeff0093d8c54377553ec6b31110bea37b4d","reference_id":"7480aeff0093d8c54377553ec6b31110bea37b4d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/7480aeff0093d8c54377553ec6b31110bea37b4d"},{"reference_url":"https://git.kernel.org/stable/c/8cf0a1bc12870d148ae830a4ba88cfdf0e879cee","reference_id":"8cf0a1bc12870d148ae830a4ba88cfdf0e879cee","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/8cf0a1bc12870d148ae830a4ba88cfdf0e879cee"},{"reference_url":"https://git.kernel.org/stable/c/90577bcc01c4188416a47269f8433f70502abe98","reference_id":"90577bcc01c4188416a47269f8433f70502abe98","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/90577bcc01c4188416a47269f8433f70502abe98"},{"reference_url":"https://git.kernel.org/stable/c/cdf01c807e974048c43c7fd3ca574f6086a57906","reference_id":"cdf01c807e974048c43c7fd3ca574f6086a57906","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:08:33Z/"}],"url":"https://git.kernel.org/stable/c/cdf01c807e974048c43c7fd3ca574f6086a57906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49890"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xk73-nkxw-b7ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69847?format=json","vulnerability_id":"VCID-xkks-7p1q-2fbg","summary":"kernel: drm/amdgpu: Fix call trace warning and hang when removing amdgpu device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53036.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53036","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53036"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363739","reference_id":"2363739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53036"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xkks-7p1q-2fbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66955?format=json","vulnerability_id":"VCID-xpyd-juuc-5kf6","summary":"kernel: drm/i915: Fix memory leaks in i915 selftests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53677.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53677","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05593","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53677"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402203","reference_id":"2402203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-53677"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpyd-juuc-5kf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71550?format=json","vulnerability_id":"VCID-xspc-gnaq-v3at","summary":"kernel: tick/nohz: unexport __init-annotated tick_nohz_full_setup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49675.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49675","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23496","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23528","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2348","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348124","reference_id":"2348124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9315","reference_id":"RHSA-2024:9315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9315"}],"fixed_packages":[],"aliases":["CVE-2022-49675"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xspc-gnaq-v3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66984?format=json","vulnerability_id":"VCID-xtez-b58n-yydw","summary":"kernel: drm/i915/perf: add sentinel to xehp_oa_b_counters","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53646.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53646","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0596","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05881","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05957","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402234","reference_id":"2402234","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2023-53646"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xtez-b58n-yydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65338?format=json","vulnerability_id":"VCID-xw51-xeu8-97df","summary":"kernel: ALSA: ymfpci: Create card with device-managed snd_devm_card_new()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54308.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54308","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426114","reference_id":"2426114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54308"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xw51-xeu8-97df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69890?format=json","vulnerability_id":"VCID-xyzh-7qzz-zfeb","summary":"kernel: drm/shmem-helper: Remove another errant put in error path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53084.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53084","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19816","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19662","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19746","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19709","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19737","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363784","reference_id":"2363784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53084"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyzh-7qzz-zfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65578?format=json","vulnerability_id":"VCID-y62y-rgp5-e7am","summary":"kernel: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54029.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54029.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424963","reference_id":"2424963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54029"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y62y-rgp5-e7am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68518?format=json","vulnerability_id":"VCID-ykvm-p41c-9fhq","summary":"kernel: NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38393.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38393","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04194","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05372","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05337","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383408","reference_id":"2383408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11850","reference_id":"RHSA-2025:11850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11850"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38393"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ykvm-p41c-9fhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65263?format=json","vulnerability_id":"VCID-ympn-kba7-uubp","summary":"kernel: net/mlx5e: Don't clone flow post action attributes second time","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54262.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54262.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54262","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54262"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426037","reference_id":"2426037","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54262"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ympn-kba7-uubp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67543?format=json","vulnerability_id":"VCID-yrka-zpny-hbd1","summary":"kernel: Linux kernel: Denial of Service and information disclosure via undefined bit shift in drm/ttm","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50390.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50390","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0388","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05118","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05108","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05202","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05208","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04899","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50390"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396433","reference_id":"2396433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396433"},{"reference_url":"https://git.kernel.org/stable/c/2ff0309b73d86e8591881ac035af06e01c112e89","reference_id":"2ff0309b73d86e8591881ac035af06e01c112e89","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"}],"url":"https://git.kernel.org/stable/c/2ff0309b73d86e8591881ac035af06e01c112e89"},{"reference_url":"https://git.kernel.org/stable/c/387659939c00156f8d6bab0fbc55b4eaf2b6bc5b","reference_id":"387659939c00156f8d6bab0fbc55b4eaf2b6bc5b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"}],"url":"https://git.kernel.org/stable/c/387659939c00156f8d6bab0fbc55b4eaf2b6bc5b"},{"reference_url":"https://git.kernel.org/stable/c/6528971fdce0dfc0a28fec42c151a1eccdabadf5","reference_id":"6528971fdce0dfc0a28fec42c151a1eccdabadf5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"}],"url":"https://git.kernel.org/stable/c/6528971fdce0dfc0a28fec42c151a1eccdabadf5"},{"reference_url":"https://git.kernel.org/stable/c/c4079a34c0adef9f35a16783fb13a9084406f96d","reference_id":"c4079a34c0adef9f35a16783fb13a9084406f96d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:50:13Z/"}],"url":"https://git.kernel.org/stable/c/c4079a34c0adef9f35a16783fb13a9084406f96d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50390"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrka-zpny-hbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78235?format=json","vulnerability_id":"VCID-yrxe-ak75-qfhh","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4206","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19431","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19518","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19478","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23047","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4206"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrxe-ak75-qfhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67356?format=json","vulnerability_id":"VCID-yxah-yhn3-t3cd","summary":"kernel: Linux kernel: Integer overflow in iwlwifi debugfs function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53524.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53524","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400791","reference_id":"2400791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53524"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxah-yhn3-t3cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70107?format=json","vulnerability_id":"VCID-yyky-tmx3-mqg7","summary":"kernel: drm/amd/display: Fix optc2_configure warning on dcn314","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49773.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49773","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.21987","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22065","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22145","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22113","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22136","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363477","reference_id":"2363477","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49773"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyky-tmx3-mqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78237?format=json","vulnerability_id":"VCID-zbbv-tgna-hybm","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4208","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0853","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08303","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08446","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08528","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08505","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10614","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4208"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbv-tgna-hybm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67833?format=json","vulnerability_id":"VCID-zd8r-gj19-8qax","summary":"kernel: drm/amdkfd: Fix double release compute pasid","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50303.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50303","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04786","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0487","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04968","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04964","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04647","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50303"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395264","reference_id":"2395264","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50303"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zd8r-gj19-8qax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66948?format=json","vulnerability_id":"VCID-zdg9-tmxs-kff2","summary":"kernel: drm/amdkfd: Fix memory leakage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50528.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50528","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50528"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402195","reference_id":"2402195","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50528"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zdg9-tmxs-kff2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67950?format=json","vulnerability_id":"VCID-zr4c-ztay-tudd","summary":"kernel: USB: uhci: fix memory leak with using debugfs_lookup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53197.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53197","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04066","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04112","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53197"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395390","reference_id":"2395390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53197"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr4c-ztay-tudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69823?format=json","vulnerability_id":"VCID-zsdd-9uv1-6ybs","summary":"kernel: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53124.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53124.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53124","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19307","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19444","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363714","reference_id":"2363714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-53124"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdd-9uv1-6ybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78519?format=json","vulnerability_id":"VCID-zuk7-eezk-mufb","summary":"kernel: out-of-bounds write in qfq_change_class function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31436","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10421","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1038","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10334","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10186","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10234","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11271","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192671","reference_id":"2192671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192671"},{"reference_url":"https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d","reference_id":"3037933448f60f9acb705997eae62013ecb81e0d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13","reference_id":"ChangeLog-6.2.13","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13"},{"reference_url":"https://www.debian.org/security/2023/dsa-5402","reference_id":"dsa-5402","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://www.debian.org/security/2023/dsa-5402"},{"reference_url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"reference_url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"reference_url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"reference_url":"https://www.spinics.net/lists/stable-commits/msg294885.html","reference_id":"msg294885.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://www.spinics.net/lists/stable-commits/msg294885.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0001/","reference_id":"ntap-20230609-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1323","reference_id":"RHSA-2024:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1377","reference_id":"RHSA-2024:1377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1831","reference_id":"RHSA-2024:1831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1831"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6173-1/","reference_id":"USN-6173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6173-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6460-1/","reference_id":"USN-6460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6460-1/"}],"fixed_packages":[],"aliases":["CVE-2023-31436"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zuk7-eezk-mufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71654?format=json","vulnerability_id":"VCID-zuxk-225d-n7au","summary":"kernel: LSM: general protection fault in legacy_parse_param","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49180.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49180","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17139","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17119","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17061","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17019","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17084","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1712","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17292","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348229","reference_id":"2348229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-49180"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zuxk-225d-n7au"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-513.5.1%3Farch=el8_9"}