Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/servicemesh@2.1.3-1?arch=el8
Typerpm
Namespaceredhat
Nameservicemesh
Version2.1.3-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4pue-fbre-zfcf
vulnerability_id VCID-4pue-fbre-zfcf
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23806
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12203
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12248
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12048
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12129
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12181
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12189
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12152
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1212
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.1199
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11986
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12085
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053429
reference_id 2053429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053429
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5006
reference_id RHSA-2022:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5006
11
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
12
reference_url https://access.redhat.com/errata/RHSA-2022:5729
reference_id RHSA-2022:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5729
13
reference_url https://access.redhat.com/errata/RHSA-2022:5875
reference_id RHSA-2022:5875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5875
14
reference_url https://access.redhat.com/errata/RHSA-2022:6094
reference_id RHSA-2022:6094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6094
15
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
16
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
17
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
fixed_packages
aliases CVE-2022-23806
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pue-fbre-zfcf
1
url VCID-835d-4cep-d3ff
vulnerability_id VCID-835d-4cep-d3ff
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23772
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10135
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10097
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10172
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10233
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10269
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10228
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10209
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10081
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10058
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.1019
published_at 2026-04-21T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10171
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053532
reference_id 2053532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053532
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
11
reference_url https://access.redhat.com/errata/RHSA-2022:5730
reference_id RHSA-2022:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5730
12
reference_url https://access.redhat.com/errata/RHSA-2022:6155
reference_id RHSA-2022:6155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6155
13
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
14
reference_url https://access.redhat.com/errata/RHSA-2022:6526
reference_id RHSA-2022:6526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6526
15
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
16
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
17
reference_url https://access.redhat.com/errata/RHSA-2023:3914
reference_id RHSA-2023:3914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3914
18
reference_url https://access.redhat.com/errata/RHSA-2024:5754
reference_id RHSA-2024:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5754
19
reference_url https://access.redhat.com/errata/RHSA-2024:6412
reference_id RHSA-2024:6412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6412
fixed_packages
aliases CVE-2022-23772
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-835d-4cep-d3ff
2
url VCID-qjp3-nxby-1yew
vulnerability_id VCID-qjp3-nxby-1yew
summary
Ill-formed headers may lead to unexpected behavior in Istio
### Impact
Ill-formed headers sent to Envoy in certain configurations can lead to unexpected memory access resulting in undefined behavior or crashing.

You are at most risk if you have an Istio ingress Gateway exposed to external traffic.

### Patches
1.12.8, 1.13.5, 1.14.1

### Workarounds
No.

### References
More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-05)

### For more information
If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31045.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31045
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54094
published_at 2026-04-07T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54089
published_at 2026-04-02T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.54143
published_at 2026-04-09T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54146
published_at 2026-04-08T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54118
published_at 2026-04-04T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.5673
published_at 2026-04-16T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56699
published_at 2026-04-13T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.5664
published_at 2026-04-24T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.56744
published_at 2026-04-11T12:55:00Z
9
value 0.00339
scoring_system epss
scoring_elements 0.5672
published_at 2026-04-12T12:55:00Z
10
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-21T12:55:00Z
11
value 0.00339
scoring_system epss
scoring_elements 0.56728
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31045
2
reference_url https://github.com/istio/istio
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/istio/istio
3
reference_url https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:37Z/
url https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x
4
reference_url https://istio.io/latest/news/security/istio-security-2022-05
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:37Z/
url https://istio.io/latest/news/security/istio-security-2022-05
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31045
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31045
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2088819
reference_id 2088819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2088819
7
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
fixed_packages
aliases CVE-2022-31045, GHSA-xwx5-5c9g-x68x
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjp3-nxby-1yew
3
url VCID-z5x6-xqtc-q3at
vulnerability_id VCID-z5x6-xqtc-q3at
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23773
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30823
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.3087
published_at 2026-04-04T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30689
published_at 2026-04-07T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-08T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30779
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30782
published_at 2026-04-11T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30738
published_at 2026-04-12T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-13T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30716
published_at 2026-04-16T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-18T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30664
published_at 2026-04-21T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30487
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053541
reference_id 2053541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053541
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
11
reference_url https://access.redhat.com/errata/RHSA-2022:5729
reference_id RHSA-2022:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5729
12
reference_url https://access.redhat.com/errata/RHSA-2022:5875
reference_id RHSA-2022:5875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5875
13
reference_url https://access.redhat.com/errata/RHSA-2022:6094
reference_id RHSA-2022:6094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6094
14
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
15
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
16
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
fixed_packages
aliases CVE-2022-23773
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5x6-xqtc-q3at
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.1.3-1%3Farch=el8