{"url":"http://public2.vulnerablecode.io/api/packages/87580?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-553.82.1?arch=el8_10","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-553.82.1","qualifiers":{"arch":"el8_10"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67474?format=json","vulnerability_id":"VCID-1jvn-mqky-83d5","summary":"kernel: wifi: cfg80211: fix use-after-free in cmp_bss()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39864.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39864","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03862","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03846","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396934","reference_id":"2396934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19440","reference_id":"RHSA-2025:19440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19962","reference_id":"RHSA-2025:19962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21463","reference_id":"RHSA-2025:21463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22392","reference_id":"RHSA-2025:22392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22405","reference_id":"RHSA-2025:22405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23422","reference_id":"RHSA-2025:23422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23423","reference_id":"RHSA-2025:23423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23424","reference_id":"RHSA-2025:23424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23426","reference_id":"RHSA-2025:23426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23450","reference_id":"RHSA-2025:23450","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23450"},{"reference_url":"https://usn.ubuntu.com/7909-1/","reference_id":"USN-7909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-1/"},{"reference_url":"https://usn.ubuntu.com/7909-2/","reference_id":"USN-7909-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-2/"},{"reference_url":"https://usn.ubuntu.com/7909-3/","reference_id":"USN-7909-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-3/"},{"reference_url":"https://usn.ubuntu.com/7909-4/","reference_id":"USN-7909-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-4/"},{"reference_url":"https://usn.ubuntu.com/7909-5/","reference_id":"USN-7909-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-5/"},{"reference_url":"https://usn.ubuntu.com/7910-1/","reference_id":"USN-7910-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-1/"},{"reference_url":"https://usn.ubuntu.com/7910-2/","reference_id":"USN-7910-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-2/"},{"reference_url":"https://usn.ubuntu.com/7933-1/","reference_id":"USN-7933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7933-1/"},{"reference_url":"https://usn.ubuntu.com/7938-1/","reference_id":"USN-7938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7938-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-39864"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jvn-mqky-83d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67977?format=json","vulnerability_id":"VCID-6t5m-uuun-fqhe","summary":"kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53226","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0373","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941","reference_id":"11958528161731c58e105b501ed60b83a91ea941","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395420","reference_id":"2395420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395420"},{"reference_url":"https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154","reference_id":"29eca8b7863d1d7de6c5b746b374e3487d14f154","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154"},{"reference_url":"https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245","reference_id":"3975e21d4d01efaf0296ded40d11c06589c49245","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245"},{"reference_url":"https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331","reference_id":"3fe3923d092e22d87d1ed03e2729db444b8c1331","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331"},{"reference_url":"https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed","reference_id":"650d1bc02fba7b42f476d8b6643324abac5921ed","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed"},{"reference_url":"https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02","reference_id":"7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02"},{"reference_url":"https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869","reference_id":"8824aa4ab62c800f75d96f48e1883a5f56ec5869","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869"},{"reference_url":"https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8","reference_id":"a7300e3800e9fd5405e88ce67709c1a97783b9c8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8"},{"reference_url":"https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f","reference_id":"f517c97fc129995de77dd06aa5a74f909ebf568f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/"}],"url":"https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19440","reference_id":"RHSA-2025:19440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22998","reference_id":"RHSA-2025:22998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23000","reference_id":"RHSA-2025:23000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23463","reference_id":"RHSA-2025:23463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23463"}],"fixed_packages":[],"aliases":["CVE-2023-53226"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5m-uuun-fqhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65388?format=json","vulnerability_id":"VCID-gxc8-y1x5-1qgk","summary":"kernel: cifs: Fix xid leak in cifs_ses_add_channel()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50856","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426165","reference_id":"2426165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"}],"fixed_packages":[],"aliases":["CVE-2022-50856"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gxc8-y1x5-1qgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67822?format=json","vulnerability_id":"VCID-vqcd-ptr4-g3hp","summary":"kernel: wifi: mac80211: check S1G action frame size","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53257.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53257","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02894","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02753","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02859","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02876","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0278","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c","reference_id":"19e4a47ee74718a22e963e8a647c8c3bfe8bb05c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/"}],"url":"https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395253","reference_id":"2395253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395253"},{"reference_url":"https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db","reference_id":"5e030a2509be72b452b6f4a800786d43229414db","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/"}],"url":"https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db"},{"reference_url":"https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029","reference_id":"7ae7a1378a119780c8c17a6b5fc03011c3bb7029","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/"}],"url":"https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029"},{"reference_url":"https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1","reference_id":"fedd9377dd9c71a950d432fbe1628eebfbed70a1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/"}],"url":"https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19440","reference_id":"RHSA-2025:19440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22095","reference_id":"RHSA-2025:22095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22124","reference_id":"RHSA-2025:22124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22124"}],"fixed_packages":[],"aliases":["CVE-2023-53257"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqcd-ptr4-g3hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66238?format=json","vulnerability_id":"VCID-xhsu-dqfq-3fev","summary":"kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53751","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419858","reference_id":"2419858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"}],"fixed_packages":[],"aliases":["CVE-2023-53751"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-553.82.1%3Farch=el8_10"}