Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/cri-o@1.25.1-5.rhaos4.12.git6005903?arch=el8
Typerpm
Namespaceredhat
Namecri-o
Version1.25.1-5.rhaos4.12.git6005903
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-65mk-w8rx-zucs
vulnerability_id VCID-65mk-w8rx-zucs
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32189.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32189
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.2997
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.30018
published_at 2026-04-04T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29831
published_at 2026-04-07T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29894
published_at 2026-04-08T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2993
published_at 2026-04-09T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29935
published_at 2026-04-11T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29889
published_at 2026-04-12T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.2984
published_at 2026-04-13T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-16T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29837
published_at 2026-04-18T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29791
published_at 2026-04-21T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29714
published_at 2026-04-24T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-26T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29538
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2113814
reference_id 2113814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2113814
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
7
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
8
reference_url https://access.redhat.com/errata/RHSA-2022:7548
reference_id RHSA-2022:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7548
9
reference_url https://access.redhat.com/errata/RHSA-2022:7950
reference_id RHSA-2022:7950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7950
10
reference_url https://access.redhat.com/errata/RHSA-2022:8534
reference_id RHSA-2022:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8534
11
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
12
reference_url https://access.redhat.com/errata/RHSA-2022:8626
reference_id RHSA-2022:8626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8626
13
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
14
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
15
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
16
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
17
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
18
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
19
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
20
reference_url https://access.redhat.com/errata/RHSA-2023:2193
reference_id RHSA-2023:2193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2193
21
reference_url https://access.redhat.com/errata/RHSA-2023:2236
reference_id RHSA-2023:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2236
22
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
23
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
24
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
25
reference_url https://access.redhat.com/errata/RHSA-2023:3204
reference_id RHSA-2023:3204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3204
26
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
27
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
28
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
29
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
30
reference_url https://access.redhat.com/errata/RHSA-2026:4128
reference_id RHSA-2026:4128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4128
31
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
32
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
aliases CVE-2022-32189
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65mk-w8rx-zucs
1
url VCID-81aw-mk9s-eydd
vulnerability_id VCID-81aw-mk9s-eydd
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32148.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32148
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17672
published_at 2026-04-02T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17314
published_at 2026-04-29T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17438
published_at 2026-04-07T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.1753
published_at 2026-04-08T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17589
published_at 2026-04-09T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17605
published_at 2026-04-11T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17558
published_at 2026-04-12T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17505
published_at 2026-04-13T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17449
published_at 2026-04-16T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17458
published_at 2026-04-18T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17496
published_at 2026-04-21T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17406
published_at 2026-04-24T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17382
published_at 2026-04-26T12:55:00Z
13
value 0.00056
scoring_system epss
scoring_elements 0.17718
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32148
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107383
reference_id 2107383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107383
5
reference_url https://go.dev/cl/412857
reference_id 412857
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-23T08:15:49Z/
url https://go.dev/cl/412857
6
reference_url https://go.dev/issue/53423
reference_id 53423
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-23T08:15:49Z/
url https://go.dev/issue/53423
7
reference_url https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a
reference_id b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-23T08:15:49Z/
url https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a
8
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
9
reference_url https://pkg.go.dev/vuln/GO-2022-0520
reference_id GO-2022-0520
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-23T08:15:49Z/
url https://pkg.go.dev/vuln/GO-2022-0520
10
reference_url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
reference_id nqrv9fbR0zE
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-23T08:15:49Z/
url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
11
reference_url https://access.redhat.com/errata/RHSA-2022:5775
reference_id RHSA-2022:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5775
12
reference_url https://access.redhat.com/errata/RHSA-2022:5799
reference_id RHSA-2022:5799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5799
13
reference_url https://access.redhat.com/errata/RHSA-2022:5866
reference_id RHSA-2022:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5866
14
reference_url https://access.redhat.com/errata/RHSA-2022:6040
reference_id RHSA-2022:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6040
15
reference_url https://access.redhat.com/errata/RHSA-2022:6042
reference_id RHSA-2022:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6042
16
reference_url https://access.redhat.com/errata/RHSA-2022:6113
reference_id RHSA-2022:6113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6113
17
reference_url https://access.redhat.com/errata/RHSA-2022:6152
reference_id RHSA-2022:6152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6152
18
reference_url https://access.redhat.com/errata/RHSA-2022:6183
reference_id RHSA-2022:6183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6183
19
reference_url https://access.redhat.com/errata/RHSA-2022:6188
reference_id RHSA-2022:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6188
20
reference_url https://access.redhat.com/errata/RHSA-2022:6283
reference_id RHSA-2022:6283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6283
21
reference_url https://access.redhat.com/errata/RHSA-2022:6344
reference_id RHSA-2022:6344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6344
22
reference_url https://access.redhat.com/errata/RHSA-2022:6430
reference_id RHSA-2022:6430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6430
23
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
24
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
25
reference_url https://access.redhat.com/errata/RHSA-2022:7399
reference_id RHSA-2022:7399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7399
26
reference_url https://access.redhat.com/errata/RHSA-2022:7519
reference_id RHSA-2022:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7519
27
reference_url https://access.redhat.com/errata/RHSA-2022:7529
reference_id RHSA-2022:7529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7529
28
reference_url https://access.redhat.com/errata/RHSA-2022:7648
reference_id RHSA-2022:7648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7648
29
reference_url https://access.redhat.com/errata/RHSA-2022:8057
reference_id RHSA-2022:8057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8057
30
reference_url https://access.redhat.com/errata/RHSA-2022:8250
reference_id RHSA-2022:8250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8250
31
reference_url https://access.redhat.com/errata/RHSA-2022:8626
reference_id RHSA-2022:8626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8626
32
reference_url https://access.redhat.com/errata/RHSA-2022:9047
reference_id RHSA-2022:9047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9047
33
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
34
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
35
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
36
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
37
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
38
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
39
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
40
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
41
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
42
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
aliases CVE-2022-32148
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81aw-mk9s-eydd
2
url VCID-azr4-u36f-pbew
vulnerability_id VCID-azr4-u36f-pbew
summary Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27664.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27664
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27932
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32514
published_at 2026-04-29T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.33036
published_at 2026-04-04T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33442
published_at 2026-04-21T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33475
published_at 2026-04-18T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.335
published_at 2026-04-16T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33464
published_at 2026-04-13T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.3353
published_at 2026-04-11T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-09T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33503
published_at 2026-04-08T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33488
published_at 2026-04-12T12:55:00Z
12
value 0.00137
scoring_system epss
scoring_elements 0.33261
published_at 2026-04-26T12:55:00Z
13
value 0.00137
scoring_system epss
scoring_elements 0.33281
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27664
2
reference_url https://cs.opensource.google/go/x/net
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cs.opensource.google/go/x/net
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://go.dev/cl/428735
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/428735
6
reference_url https://go.dev/issue/54658
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/54658
7
reference_url https://groups.google.com/g/golang-announce
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce
8
reference_url https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27664
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27664
12
reference_url https://pkg.go.dev/vuln/GO-2022-0969
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0969
13
reference_url https://security.netapp.com/advisory/ntap-20220923-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220923-0004
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124669
reference_id 2124669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124669
15
reference_url https://security.gentoo.org/glsa/202209-26
reference_id GLSA-202209-26
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202209-26
16
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
17
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
18
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
19
reference_url https://access.redhat.com/errata/RHSA-2022:8626
reference_id RHSA-2022:8626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8626
20
reference_url https://access.redhat.com/errata/RHSA-2022:8634
reference_id RHSA-2022:8634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8634
21
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
22
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
23
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
24
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
25
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
26
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
27
reference_url https://access.redhat.com/errata/RHSA-2023:0708
reference_id RHSA-2023:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0708
28
reference_url https://access.redhat.com/errata/RHSA-2023:0709
reference_id RHSA-2023:0709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0709
29
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
30
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
31
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
32
reference_url https://access.redhat.com/errata/RHSA-2023:2167
reference_id RHSA-2023:2167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2167
33
reference_url https://access.redhat.com/errata/RHSA-2023:2177
reference_id RHSA-2023:2177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2177
34
reference_url https://access.redhat.com/errata/RHSA-2023:2193
reference_id RHSA-2023:2193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2193
35
reference_url https://access.redhat.com/errata/RHSA-2023:2204
reference_id RHSA-2023:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2204
36
reference_url https://access.redhat.com/errata/RHSA-2023:2236
reference_id RHSA-2023:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2236
37
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
38
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
39
reference_url https://access.redhat.com/errata/RHSA-2023:2780
reference_id RHSA-2023:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2780
40
reference_url https://access.redhat.com/errata/RHSA-2023:2784
reference_id RHSA-2023:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2784
41
reference_url https://access.redhat.com/errata/RHSA-2023:2785
reference_id RHSA-2023:2785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2785
42
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
43
reference_url https://access.redhat.com/errata/RHSA-2023:3204
reference_id RHSA-2023:3204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3204
44
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
45
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
46
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
47
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
48
reference_url https://access.redhat.com/errata/RHSA-2023:4674
reference_id RHSA-2023:4674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4674
49
reference_url https://access.redhat.com/errata/RHSA-2023:4734
reference_id RHSA-2023:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4734
50
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
51
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
52
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
53
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
54
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
55
reference_url https://usn.ubuntu.com/8089-1/
reference_id USN-8089-1
reference_type
scores
url https://usn.ubuntu.com/8089-1/
56
reference_url https://usn.ubuntu.com/8089-2/
reference_id USN-8089-2
reference_type
scores
url https://usn.ubuntu.com/8089-2/
57
reference_url https://usn.ubuntu.com/8089-3/
reference_id USN-8089-3
reference_type
scores
url https://usn.ubuntu.com/8089-3/
fixed_packages
aliases CVE-2022-27664, GHSA-69cg-p879-7622
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azr4-u36f-pbew
3
url VCID-k4yz-7mpm-h3du
vulnerability_id VCID-k4yz-7mpm-h3du
summary
CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2995.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2995.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2995
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09862
published_at 2026-04-04T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09856
published_at 2026-04-12T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09812
published_at 2026-04-02T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09892
published_at 2026-04-11T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09887
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09833
published_at 2026-04-08T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09762
published_at 2026-04-07T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09693
published_at 2026-04-18T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09723
published_at 2026-04-16T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09841
published_at 2026-04-13T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.1342
published_at 2026-04-26T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-24T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13444
published_at 2026-04-21T12:55:00Z
13
value 0.00044
scoring_system epss
scoring_elements 0.13316
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2995
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/cri-o/cri-o
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o
4
reference_url https://github.com/cri-o/cri-o/commit/db3b399a8d7dabf7f073db73894bee98311d7909
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o/commit/db3b399a8d7dabf7f073db73894bee98311d7909
5
reference_url https://github.com/cri-o/cri-o/pull/6159
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-29T15:57:43Z/
url https://github.com/cri-o/cri-o/pull/6159
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2995
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-2995
7
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121632
reference_id 2121632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121632
9
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
10
reference_url https://access.redhat.com/errata/RHSA-2023:3216
reference_id RHSA-2023:3216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3216
11
reference_url https://access.redhat.com/errata/RHSA-2023:3541
reference_id RHSA-2023:3541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3541
12
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
reference_id vulnerability-in-linux-containers-investigation-and-mitigation
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-29T15:57:43Z/
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
fixed_packages
aliases CVE-2022-2995, GHSA-phjr-8j92-w5v7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yz-7mpm-h3du
4
url VCID-mwre-u1mj-j7as
vulnerability_id VCID-mwre-u1mj-j7as
summary cri-o: Security regression of CVE-2022-27652
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3466.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3466
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06188
published_at 2026-04-29T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05945
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06136
published_at 2026-04-21T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.0615
published_at 2026-04-24T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06181
published_at 2026-04-26T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-04T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05961
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06038
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.06011
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05977
published_at 2026-04-16T12:55:00Z
13
value 0.00022
scoring_system epss
scoring_elements 0.05987
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3466
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134063
reference_id 2134063
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:33:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2134063
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
reference_id cpe:/a:redhat:openshift:3.11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
reference_id cpe:/a:redhat:openshift:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.12::el9
reference_id cpe:/a:redhat:openshift_ironic:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.12::el9
8
reference_url https://access.redhat.com/security/cve/CVE-2022-3466
reference_id CVE-2022-3466
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:33:50Z/
url https://access.redhat.com/security/cve/CVE-2022-3466
9
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2022:7398
fixed_packages
aliases CVE-2022-3466
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwre-u1mj-j7as
5
url VCID-vxks-1bkp-6bd5
vulnerability_id VCID-vxks-1bkp-6bd5
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30631.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30631
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12478
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12246
published_at 2026-04-29T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12521
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12328
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12408
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12458
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12464
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12425
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12385
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12286
published_at 2026-04-18T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12389
published_at 2026-04-21T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.1239
published_at 2026-04-24T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12357
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107342
reference_id 2107342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107342
5
reference_url https://go.dev/cl/417067
reference_id 417067
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:51:07Z/
url https://go.dev/cl/417067
6
reference_url https://go.dev/issue/53168
reference_id 53168
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:51:07Z/
url https://go.dev/issue/53168
7
reference_url https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e
reference_id b2b8872c876201eac2d0707276c6999ff3eb185e
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:51:07Z/
url https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e
8
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
9
reference_url https://pkg.go.dev/vuln/GO-2022-0524
reference_id GO-2022-0524
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:51:07Z/
url https://pkg.go.dev/vuln/GO-2022-0524
10
reference_url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
reference_id nqrv9fbR0zE
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:51:07Z/
url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
11
reference_url https://access.redhat.com/errata/RHSA-2022:5775
reference_id RHSA-2022:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5775
12
reference_url https://access.redhat.com/errata/RHSA-2022:5799
reference_id RHSA-2022:5799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5799
13
reference_url https://access.redhat.com/errata/RHSA-2022:5866
reference_id RHSA-2022:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5866
14
reference_url https://access.redhat.com/errata/RHSA-2022:5875
reference_id RHSA-2022:5875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5875
15
reference_url https://access.redhat.com/errata/RHSA-2022:5879
reference_id RHSA-2022:5879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5879
16
reference_url https://access.redhat.com/errata/RHSA-2022:5923
reference_id RHSA-2022:5923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5923
17
reference_url https://access.redhat.com/errata/RHSA-2022:5924
reference_id RHSA-2022:5924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5924
18
reference_url https://access.redhat.com/errata/RHSA-2022:6040
reference_id RHSA-2022:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6040
19
reference_url https://access.redhat.com/errata/RHSA-2022:6042
reference_id RHSA-2022:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6042
20
reference_url https://access.redhat.com/errata/RHSA-2022:6051
reference_id RHSA-2022:6051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6051
21
reference_url https://access.redhat.com/errata/RHSA-2022:6053
reference_id RHSA-2022:6053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6053
22
reference_url https://access.redhat.com/errata/RHSA-2022:6061
reference_id RHSA-2022:6061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6061
23
reference_url https://access.redhat.com/errata/RHSA-2022:6062
reference_id RHSA-2022:6062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6062
24
reference_url https://access.redhat.com/errata/RHSA-2022:6065
reference_id RHSA-2022:6065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6065
25
reference_url https://access.redhat.com/errata/RHSA-2022:6066
reference_id RHSA-2022:6066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6066
26
reference_url https://access.redhat.com/errata/RHSA-2022:6103
reference_id RHSA-2022:6103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6103
27
reference_url https://access.redhat.com/errata/RHSA-2022:6113
reference_id RHSA-2022:6113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6113
28
reference_url https://access.redhat.com/errata/RHSA-2022:6152
reference_id RHSA-2022:6152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6152
29
reference_url https://access.redhat.com/errata/RHSA-2022:6182
reference_id RHSA-2022:6182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6182
30
reference_url https://access.redhat.com/errata/RHSA-2022:6183
reference_id RHSA-2022:6183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6183
31
reference_url https://access.redhat.com/errata/RHSA-2022:6184
reference_id RHSA-2022:6184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6184
32
reference_url https://access.redhat.com/errata/RHSA-2022:6187
reference_id RHSA-2022:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6187
33
reference_url https://access.redhat.com/errata/RHSA-2022:6188
reference_id RHSA-2022:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6188
34
reference_url https://access.redhat.com/errata/RHSA-2022:6262
reference_id RHSA-2022:6262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6262
35
reference_url https://access.redhat.com/errata/RHSA-2022:6290
reference_id RHSA-2022:6290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6290
36
reference_url https://access.redhat.com/errata/RHSA-2022:6308
reference_id RHSA-2022:6308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6308
37
reference_url https://access.redhat.com/errata/RHSA-2022:6344
reference_id RHSA-2022:6344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6344
38
reference_url https://access.redhat.com/errata/RHSA-2022:6429
reference_id RHSA-2022:6429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6429
39
reference_url https://access.redhat.com/errata/RHSA-2022:6430
reference_id RHSA-2022:6430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6430
40
reference_url https://access.redhat.com/errata/RHSA-2022:6517
reference_id RHSA-2022:6517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6517
41
reference_url https://access.redhat.com/errata/RHSA-2022:6560
reference_id RHSA-2022:6560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6560
42
reference_url https://access.redhat.com/errata/RHSA-2022:6714
reference_id RHSA-2022:6714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6714
43
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
44
reference_url https://access.redhat.com/errata/RHSA-2022:7519
reference_id RHSA-2022:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7519
45
reference_url https://access.redhat.com/errata/RHSA-2022:7529
reference_id RHSA-2022:7529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7529
46
reference_url https://access.redhat.com/errata/RHSA-2022:7648
reference_id RHSA-2022:7648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7648
47
reference_url https://access.redhat.com/errata/RHSA-2022:8057
reference_id RHSA-2022:8057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8057
48
reference_url https://access.redhat.com/errata/RHSA-2022:8098
reference_id RHSA-2022:8098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8098
49
reference_url https://access.redhat.com/errata/RHSA-2022:8250
reference_id RHSA-2022:8250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8250
50
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
51
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
52
reference_url https://access.redhat.com/errata/RHSA-2023:0727
reference_id RHSA-2023:0727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0727
53
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
54
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
55
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
56
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
57
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
58
reference_url https://access.redhat.com/errata/RHSA-2024:2180
reference_id RHSA-2024:2180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2180
59
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
60
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
aliases CVE-2022-30631
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxks-1bkp-6bd5
6
url VCID-x63z-bjr8-j7d7
vulnerability_id VCID-x63z-bjr8-j7d7
summary A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2996.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2996
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45834
published_at 2026-04-29T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45915
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45936
published_at 2026-04-04T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45884
published_at 2026-04-07T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.4594
published_at 2026-04-08T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45937
published_at 2026-04-09T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.4596
published_at 2026-04-11T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45931
published_at 2026-04-12T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45939
published_at 2026-04-13T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.4599
published_at 2026-04-16T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45986
published_at 2026-04-18T12:55:00Z
11
value 0.00231
scoring_system epss
scoring_elements 0.45932
published_at 2026-04-21T12:55:00Z
12
value 0.00231
scoring_system epss
scoring_elements 0.45881
published_at 2026-04-24T12:55:00Z
13
value 0.00231
scoring_system epss
scoring_elements 0.45891
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2996
3
reference_url https://github.com/openstack-archive/python-scciclient
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack-archive/python-scciclient
4
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/python-scciclient/PYSEC-2022-43152.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/python-scciclient/PYSEC-2022-43152.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2996
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-2996
7
reference_url https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018213
reference_id 1018213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018213
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115122
reference_id 2115122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115122
10
reference_url https://github.com/advisories/GHSA-rf3f-3p37-2qh4
reference_id GHSA-rf3f-3p37-2qh4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rf3f-3p37-2qh4
11
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
12
reference_url https://access.redhat.com/errata/RHSA-2022:8854
reference_id RHSA-2022:8854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8854
13
reference_url https://access.redhat.com/errata/RHSA-2022:8868
reference_id RHSA-2022:8868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8868
14
reference_url https://access.redhat.com/errata/RHSA-2023:0276
reference_id RHSA-2023:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0276
fixed_packages
aliases CVE-2022-2996, GHSA-rf3f-3p37-2qh4, PYSEC-2022-43152
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x63z-bjr8-j7d7
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.25.1-5.rhaos4.12.git6005903%3Farch=el8