Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/skopeo@2:1.9.4-3.1.rhaos4.12?arch=el8
Typerpm
Namespaceredhat
Nameskopeo
Version2:1.9.4-3.1.rhaos4.12
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1rsj-pm1p-qbd6
vulnerability_id VCID-1rsj-pm1p-qbd6
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2880
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.09016
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09067
published_at 2026-04-04T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08991
published_at 2026-04-07T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.09102
published_at 2026-04-09T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09103
published_at 2026-04-11T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.09056
published_at 2026-04-13T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08951
published_at 2026-04-16T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08932
published_at 2026-04-18T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.09084
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2132868
reference_id 2132868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2132868
5
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
6
reference_url https://access.redhat.com/errata/RHSA-2022:7399
reference_id RHSA-2022:7399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7399
7
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
8
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
9
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
10
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
11
reference_url https://access.redhat.com/errata/RHSA-2023:0445
reference_id RHSA-2023:0445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0445
12
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
13
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
14
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
15
reference_url https://access.redhat.com/errata/RHSA-2023:0708
reference_id RHSA-2023:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0708
16
reference_url https://access.redhat.com/errata/RHSA-2023:0709
reference_id RHSA-2023:0709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0709
17
reference_url https://access.redhat.com/errata/RHSA-2023:0727
reference_id RHSA-2023:0727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0727
18
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
19
reference_url https://access.redhat.com/errata/RHSA-2023:1174
reference_id RHSA-2023:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1174
20
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
21
reference_url https://access.redhat.com/errata/RHSA-2023:2167
reference_id RHSA-2023:2167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2167
22
reference_url https://access.redhat.com/errata/RHSA-2023:2204
reference_id RHSA-2023:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2204
23
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
24
reference_url https://access.redhat.com/errata/RHSA-2023:2780
reference_id RHSA-2023:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2780
25
reference_url https://access.redhat.com/errata/RHSA-2023:2784
reference_id RHSA-2023:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2784
26
reference_url https://access.redhat.com/errata/RHSA-2023:2866
reference_id RHSA-2023:2866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2866
27
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
28
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
29
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
30
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
31
reference_url https://access.redhat.com/errata/RHSA-2023:4003
reference_id RHSA-2023:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4003
32
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
33
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
34
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
35
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
36
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
aliases CVE-2022-2880
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rsj-pm1p-qbd6
1
url VCID-3ypr-ppaw-kkf4
vulnerability_id VCID-3ypr-ppaw-kkf4
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2879.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2879
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03412
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03425
published_at 2026-04-11T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.0344
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03443
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03465
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03396
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03373
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0336
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03477
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2132867
reference_id 2132867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2132867
5
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
6
reference_url https://access.redhat.com/errata/RHSA-2022:7399
reference_id RHSA-2022:7399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7399
7
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
8
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
9
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
10
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
11
reference_url https://access.redhat.com/errata/RHSA-2023:0445
reference_id RHSA-2023:0445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0445
12
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
13
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
14
reference_url https://access.redhat.com/errata/RHSA-2023:0708
reference_id RHSA-2023:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0708
15
reference_url https://access.redhat.com/errata/RHSA-2023:0709
reference_id RHSA-2023:0709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0709
16
reference_url https://access.redhat.com/errata/RHSA-2023:0727
reference_id RHSA-2023:0727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0727
17
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
18
reference_url https://access.redhat.com/errata/RHSA-2023:1079
reference_id RHSA-2023:1079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1079
19
reference_url https://access.redhat.com/errata/RHSA-2023:1174
reference_id RHSA-2023:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1174
20
reference_url https://access.redhat.com/errata/RHSA-2023:2204
reference_id RHSA-2023:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2204
21
reference_url https://access.redhat.com/errata/RHSA-2023:2780
reference_id RHSA-2023:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2780
22
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
23
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
24
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
25
reference_url https://access.redhat.com/errata/RHSA-2023:4003
reference_id RHSA-2023:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4003
26
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
27
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
28
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
29
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
30
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
aliases CVE-2022-2879
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ypr-ppaw-kkf4
2
url VCID-azr4-u36f-pbew
vulnerability_id VCID-azr4-u36f-pbew
summary Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27664.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27664
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27932
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-07T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.33036
published_at 2026-04-04T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.335
published_at 2026-04-16T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33464
published_at 2026-04-13T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33488
published_at 2026-04-12T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.3353
published_at 2026-04-11T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-09T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33503
published_at 2026-04-08T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33442
published_at 2026-04-21T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33475
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27664
2
reference_url https://cs.opensource.google/go/x/net
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cs.opensource.google/go/x/net
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://go.dev/cl/428735
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/428735
6
reference_url https://go.dev/issue/54658
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/54658
7
reference_url https://groups.google.com/g/golang-announce
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce
8
reference_url https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXKTHIGE5F576MAPFYCIJXNRGBSPISUF
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXS2OQ57KZC5XZKK5UW4SYKPVQAHIOJX
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27664
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27664
12
reference_url https://pkg.go.dev/vuln/GO-2022-0969
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0969
13
reference_url https://security.netapp.com/advisory/ntap-20220923-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220923-0004
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124669
reference_id 2124669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124669
15
reference_url https://security.gentoo.org/glsa/202209-26
reference_id GLSA-202209-26
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202209-26
16
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
17
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
18
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
19
reference_url https://access.redhat.com/errata/RHSA-2022:8626
reference_id RHSA-2022:8626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8626
20
reference_url https://access.redhat.com/errata/RHSA-2022:8634
reference_id RHSA-2022:8634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8634
21
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
22
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
23
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
24
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
25
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
26
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
27
reference_url https://access.redhat.com/errata/RHSA-2023:0708
reference_id RHSA-2023:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0708
28
reference_url https://access.redhat.com/errata/RHSA-2023:0709
reference_id RHSA-2023:0709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0709
29
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
30
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
31
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
32
reference_url https://access.redhat.com/errata/RHSA-2023:2167
reference_id RHSA-2023:2167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2167
33
reference_url https://access.redhat.com/errata/RHSA-2023:2177
reference_id RHSA-2023:2177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2177
34
reference_url https://access.redhat.com/errata/RHSA-2023:2193
reference_id RHSA-2023:2193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2193
35
reference_url https://access.redhat.com/errata/RHSA-2023:2204
reference_id RHSA-2023:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2204
36
reference_url https://access.redhat.com/errata/RHSA-2023:2236
reference_id RHSA-2023:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2236
37
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
38
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
39
reference_url https://access.redhat.com/errata/RHSA-2023:2780
reference_id RHSA-2023:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2780
40
reference_url https://access.redhat.com/errata/RHSA-2023:2784
reference_id RHSA-2023:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2784
41
reference_url https://access.redhat.com/errata/RHSA-2023:2785
reference_id RHSA-2023:2785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2785
42
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
43
reference_url https://access.redhat.com/errata/RHSA-2023:3204
reference_id RHSA-2023:3204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3204
44
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
45
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
46
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
47
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
48
reference_url https://access.redhat.com/errata/RHSA-2023:4674
reference_id RHSA-2023:4674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4674
49
reference_url https://access.redhat.com/errata/RHSA-2023:4734
reference_id RHSA-2023:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4734
50
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
51
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
52
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
53
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
54
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
55
reference_url https://usn.ubuntu.com/8089-1/
reference_id USN-8089-1
reference_type
scores
url https://usn.ubuntu.com/8089-1/
56
reference_url https://usn.ubuntu.com/8089-2/
reference_id USN-8089-2
reference_type
scores
url https://usn.ubuntu.com/8089-2/
57
reference_url https://usn.ubuntu.com/8089-3/
reference_id USN-8089-3
reference_type
scores
url https://usn.ubuntu.com/8089-3/
fixed_packages
aliases CVE-2022-27664, GHSA-69cg-p879-7622
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azr4-u36f-pbew
3
url VCID-rtb8-bayb-dfbn
vulnerability_id VCID-rtb8-bayb-dfbn
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41715.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41715
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03813
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03826
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03841
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03846
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0387
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03814
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03787
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03767
published_at 2026-04-16T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03778
published_at 2026-04-18T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03901
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2132872
reference_id 2132872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2132872
5
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
6
reference_url https://access.redhat.com/errata/RHSA-2022:7399
reference_id RHSA-2022:7399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7399
7
reference_url https://access.redhat.com/errata/RHSA-2022:8535
reference_id RHSA-2022:8535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8535
8
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
9
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
10
reference_url https://access.redhat.com/errata/RHSA-2023:0328
reference_id RHSA-2023:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0328
11
reference_url https://access.redhat.com/errata/RHSA-2023:0445
reference_id RHSA-2023:0445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0445
12
reference_url https://access.redhat.com/errata/RHSA-2023:0446
reference_id RHSA-2023:0446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0446
13
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
14
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
15
reference_url https://access.redhat.com/errata/RHSA-2023:0708
reference_id RHSA-2023:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0708
16
reference_url https://access.redhat.com/errata/RHSA-2023:0709
reference_id RHSA-2023:0709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0709
17
reference_url https://access.redhat.com/errata/RHSA-2023:0727
reference_id RHSA-2023:0727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0727
18
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
19
reference_url https://access.redhat.com/errata/RHSA-2023:1079
reference_id RHSA-2023:1079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1079
20
reference_url https://access.redhat.com/errata/RHSA-2023:1174
reference_id RHSA-2023:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1174
21
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
22
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
23
reference_url https://access.redhat.com/errata/RHSA-2023:2167
reference_id RHSA-2023:2167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2167
24
reference_url https://access.redhat.com/errata/RHSA-2023:2204
reference_id RHSA-2023:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2204
25
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
26
reference_url https://access.redhat.com/errata/RHSA-2023:2592
reference_id RHSA-2023:2592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2592
27
reference_url https://access.redhat.com/errata/RHSA-2023:2780
reference_id RHSA-2023:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2780
28
reference_url https://access.redhat.com/errata/RHSA-2023:2784
reference_id RHSA-2023:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2784
29
reference_url https://access.redhat.com/errata/RHSA-2023:2866
reference_id RHSA-2023:2866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2866
30
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
31
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
32
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
33
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
34
reference_url https://access.redhat.com/errata/RHSA-2023:4003
reference_id RHSA-2023:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4003
35
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
36
reference_url https://access.redhat.com/errata/RHSA-2024:2586
reference_id RHSA-2024:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2586
37
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
38
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
39
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
fixed_packages
aliases CVE-2022-41715
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rtb8-bayb-dfbn
4
url VCID-ttsj-3bd1-tfhu
vulnerability_id VCID-ttsj-3bd1-tfhu
summary
Podman's incorrect handling of the supplementary groups may lead to data disclosure, modification
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
references
0
reference_url https://access.redhat.com/errata/RHSA-2022:7822
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2022:7822
1
reference_url https://access.redhat.com/errata/RHSA-2022:8008
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2022:8008
2
reference_url https://access.redhat.com/errata/RHSA-2022:8431
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2022:8431
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2989.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2989.json
4
reference_url https://access.redhat.com/security/cve/CVE-2022-2989
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2022-2989
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2989
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-21T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14346
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.1441
published_at 2026-04-04T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14217
published_at 2026-04-07T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.143
published_at 2026-04-11T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14354
published_at 2026-04-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14261
published_at 2026-04-12T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14206
published_at 2026-04-13T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14096
published_at 2026-04-16T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14095
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2989
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121445
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T18:14:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2121445
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://github.com/containers/podman
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman
10
reference_url https://github.com/containers/podman/pull/15618
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/pull/15618
11
reference_url https://github.com/containers/podman/pull/15677
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/pull/15677
12
reference_url https://github.com/containers/podman/pull/15696
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/pull/15696
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2989
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-2989
14
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019591
reference_id 1019591
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019591
16
reference_url https://security.gentoo.org/glsa/202407-12
reference_id GLSA-202407-12
reference_type
scores
url https://security.gentoo.org/glsa/202407-12
17
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
18
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
19
reference_url https://usn.ubuntu.com/6295-1/
reference_id USN-6295-1
reference_type
scores
url https://usn.ubuntu.com/6295-1/
20
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
reference_id vulnerability-in-linux-containers-investigation-and-mitigation
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T18:14:40Z/
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
fixed_packages
aliases CVE-2022-2989, GHSA-4wjj-jwc9-2x96
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttsj-3bd1-tfhu
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.9.4-3.1.rhaos4.12%3Farch=el8