Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/atomic-openshift@3.11.248-1.git.0.92ee8ac?arch=el7
Typerpm
Namespaceredhat
Nameatomic-openshift
Version3.11.248-1.git.0.92ee8ac
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-dxhw-y156-2kfz
vulnerability_id VCID-dxhw-y156-2kfz
summary
Kubernetes API Server DoS Via API Requests
The Kubernetes API server component in Kubernetes versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8552.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8552
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22426
published_at 2026-04-21T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.2241
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22577
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.2262
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22407
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22488
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22543
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.2252
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-16T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22477
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8552
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8552
3
reference_url https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb
4
reference_url https://github.com/kubernetes/kubernetes/issues/89378
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/89378
5
reference_url https://github.com/kubernetes/kubernetes/pull/87669
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/87669
6
reference_url https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
7
reference_url https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8552
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8552
11
reference_url https://security.netapp.com/advisory/ntap-20200413-0003
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200413-0003
12
reference_url https://security.netapp.com/advisory/ntap-20200413-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200413-0003/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1797909
reference_id 1797909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1797909
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://access.redhat.com/errata/RHSA-2020:0933
reference_id RHSA-2020:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0933
17
reference_url https://access.redhat.com/errata/RHSA-2020:1526
reference_id RHSA-2020:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1526
18
reference_url https://access.redhat.com/errata/RHSA-2020:1527
reference_id RHSA-2020:1527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1527
19
reference_url https://access.redhat.com/errata/RHSA-2020:2306
reference_id RHSA-2020:2306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2306
20
reference_url https://access.redhat.com/errata/RHSA-2020:2992
reference_id RHSA-2020:2992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2992
fixed_packages
aliases CVE-2020-8552, GHSA-82hx-w2r5-c2wq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxhw-y156-2kfz
1
url VCID-tc46-9vdm-xudz
vulnerability_id VCID-tc46-9vdm-xudz
summary
Improper Authentication in Kubernetes
A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8558.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8558
reference_id
reference_type
scores
0
value 0.20149
scoring_system epss
scoring_elements 0.95456
published_at 2026-04-01T12:55:00Z
1
value 0.20149
scoring_system epss
scoring_elements 0.95493
published_at 2026-04-13T12:55:00Z
2
value 0.20149
scoring_system epss
scoring_elements 0.95492
published_at 2026-04-12T12:55:00Z
3
value 0.20149
scoring_system epss
scoring_elements 0.9549
published_at 2026-04-11T12:55:00Z
4
value 0.20149
scoring_system epss
scoring_elements 0.95485
published_at 2026-04-09T12:55:00Z
5
value 0.20149
scoring_system epss
scoring_elements 0.95482
published_at 2026-04-08T12:55:00Z
6
value 0.20149
scoring_system epss
scoring_elements 0.95476
published_at 2026-04-07T12:55:00Z
7
value 0.20149
scoring_system epss
scoring_elements 0.95472
published_at 2026-04-04T12:55:00Z
8
value 0.20149
scoring_system epss
scoring_elements 0.95466
published_at 2026-04-02T12:55:00Z
9
value 0.20149
scoring_system epss
scoring_elements 0.95509
published_at 2026-04-21T12:55:00Z
10
value 0.20149
scoring_system epss
scoring_elements 0.95506
published_at 2026-04-18T12:55:00Z
11
value 0.20149
scoring_system epss
scoring_elements 0.95501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8558
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843358
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1843358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg
6
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
7
reference_url https://github.com/kubernetes/kubernetes/issues/92315
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/92315
8
reference_url https://github.com/tabbysable/POC-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/tabbysable/POC-2020-8558
9
reference_url https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ
10
reference_url https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE
11
reference_url https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8558
13
reference_url https://security.netapp.com/advisory/ntap-20200821-0001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200821-0001
14
reference_url https://www.openwall.com/lists/oss-security/2020/07/08/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openwall.com/lists/oss-security/2020/07/08/1
15
reference_url https://access.redhat.com/errata/RHSA-2020:2412
reference_id RHSA-2020:2412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2412
16
reference_url https://access.redhat.com/errata/RHSA-2020:2413
reference_id RHSA-2020:2413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2413
17
reference_url https://access.redhat.com/errata/RHSA-2020:2926
reference_id RHSA-2020:2926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2926
18
reference_url https://access.redhat.com/errata/RHSA-2020:2927
reference_id RHSA-2020:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2927
19
reference_url https://access.redhat.com/errata/RHSA-2020:2992
reference_id RHSA-2020:2992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2992
20
reference_url https://access.redhat.com/errata/RHSA-2020:3183
reference_id RHSA-2020:3183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3183
21
reference_url https://access.redhat.com/errata/RHSA-2020:3184
reference_id RHSA-2020:3184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3184
fixed_packages
aliases CVE-2020-8558, GHSA-wqv3-8cm6-h6wg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc46-9vdm-xudz
2
url VCID-vfxz-vfmr-w3d1
vulnerability_id VCID-vfxz-vfmr-w3d1
summary
GPGME Go wrapper contains Use After Free
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
references
0
reference_url https://access.redhat.com/errata/RHSA-2020:0679
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0679
1
reference_url https://access.redhat.com/errata/RHSA-2020:0689
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0689
2
reference_url https://access.redhat.com/errata/RHSA-2020:0697
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0697
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8945.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8945
reference_id
reference_type
scores
0
value 0.01939
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-09T12:55:00Z
1
value 0.01939
scoring_system epss
scoring_elements 0.8343
published_at 2026-04-11T12:55:00Z
2
value 0.01939
scoring_system epss
scoring_elements 0.83425
published_at 2026-04-12T12:55:00Z
3
value 0.01939
scoring_system epss
scoring_elements 0.83382
published_at 2026-04-04T12:55:00Z
4
value 0.01939
scoring_system epss
scoring_elements 0.83367
published_at 2026-04-02T12:55:00Z
5
value 0.01939
scoring_system epss
scoring_elements 0.83354
published_at 2026-04-01T12:55:00Z
6
value 0.01939
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-13T12:55:00Z
7
value 0.01939
scoring_system epss
scoring_elements 0.83456
published_at 2026-04-16T12:55:00Z
8
value 0.01939
scoring_system epss
scoring_elements 0.83457
published_at 2026-04-21T12:55:00Z
9
value 0.01939
scoring_system epss
scoring_elements 0.83406
published_at 2026-04-08T12:55:00Z
10
value 0.01939
scoring_system epss
scoring_elements 0.83381
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8945
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795838
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1795838
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8945
7
reference_url https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1
8
reference_url https://github.com/proglottis/gpgme
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme
9
reference_url https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
10
reference_url https://github.com/proglottis/gpgme/compare/v0.1.0...v0.1.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/compare/v0.1.0...v0.1.1
11
reference_url https://github.com/proglottis/gpgme/pull/23
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/pull/23
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6P6SSNKN4H6GSEVROHBDXA64PX7EOED
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6P6SSNKN4H6GSEVROHBDXA64PX7EOED
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDBT77KV3U7BESJX3P4S4MPVDGRTAQA2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDBT77KV3U7BESJX3P4S4MPVDGRTAQA2
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8945
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8945
17
reference_url https://pkg.go.dev/vuln/GO-2021-0096
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0096
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951372
reference_id 951372
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951372
19
reference_url https://access.redhat.com/errata/RHSA-2020:0863
reference_id RHSA-2020:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0863
20
reference_url https://access.redhat.com/errata/RHSA-2020:0928
reference_id RHSA-2020:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0928
21
reference_url https://access.redhat.com/errata/RHSA-2020:0934
reference_id RHSA-2020:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0934
22
reference_url https://access.redhat.com/errata/RHSA-2020:1230
reference_id RHSA-2020:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1230
23
reference_url https://access.redhat.com/errata/RHSA-2020:1231
reference_id RHSA-2020:1231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1231
24
reference_url https://access.redhat.com/errata/RHSA-2020:1234
reference_id RHSA-2020:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1234
25
reference_url https://access.redhat.com/errata/RHSA-2020:1396
reference_id RHSA-2020:1396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1396
26
reference_url https://access.redhat.com/errata/RHSA-2020:1402
reference_id RHSA-2020:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1402
27
reference_url https://access.redhat.com/errata/RHSA-2020:1937
reference_id RHSA-2020:1937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1937
28
reference_url https://access.redhat.com/errata/RHSA-2020:1940
reference_id RHSA-2020:1940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1940
29
reference_url https://access.redhat.com/errata/RHSA-2020:2027
reference_id RHSA-2020:2027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2027
30
reference_url https://access.redhat.com/errata/RHSA-2020:2117
reference_id RHSA-2020:2117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2117
31
reference_url https://access.redhat.com/errata/RHSA-2020:2413
reference_id RHSA-2020:2413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2413
32
reference_url https://access.redhat.com/errata/RHSA-2020:2927
reference_id RHSA-2020:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2927
33
reference_url https://access.redhat.com/errata/RHSA-2020:2992
reference_id RHSA-2020:2992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2992
34
reference_url https://access.redhat.com/errata/RHSA-2020:3167
reference_id RHSA-2020:3167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3167
fixed_packages
aliases CVE-2020-8945, GHSA-m6wg-2mwg-4rfq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxz-vfmr-w3d1
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.11.248-1.git.0.92ee8ac%3Farch=el7