Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/eap7-wildfly@7.4.5-3.GA_redhat_00001.1?arch=el7eap
Typerpm
Namespaceredhat
Nameeap7-wildfly
Version7.4.5-3.GA_redhat_00001.1
Qualifiers
arch el7eap
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-e37q-8shh-v7aw
vulnerability_id VCID-e37q-8shh-v7aw
summary
Unknown Vulnerability
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21363
reference_id
reference_type
scores
0
value 0.01012
scoring_system epss
scoring_elements 0.77249
published_at 2026-05-07T12:55:00Z
1
value 0.01012
scoring_system epss
scoring_elements 0.77167
published_at 2026-04-18T12:55:00Z
2
value 0.01012
scoring_system epss
scoring_elements 0.77159
published_at 2026-04-21T12:55:00Z
3
value 0.01012
scoring_system epss
scoring_elements 0.77194
published_at 2026-04-24T12:55:00Z
4
value 0.01012
scoring_system epss
scoring_elements 0.772
published_at 2026-04-26T12:55:00Z
5
value 0.01012
scoring_system epss
scoring_elements 0.77215
published_at 2026-04-29T12:55:00Z
6
value 0.01012
scoring_system epss
scoring_elements 0.7722
published_at 2026-05-05T12:55:00Z
7
value 0.01012
scoring_system epss
scoring_elements 0.77069
published_at 2026-04-02T12:55:00Z
8
value 0.01012
scoring_system epss
scoring_elements 0.77098
published_at 2026-04-04T12:55:00Z
9
value 0.01012
scoring_system epss
scoring_elements 0.77081
published_at 2026-04-07T12:55:00Z
10
value 0.01012
scoring_system epss
scoring_elements 0.77113
published_at 2026-04-08T12:55:00Z
11
value 0.01012
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-09T12:55:00Z
12
value 0.01012
scoring_system epss
scoring_elements 0.7715
published_at 2026-04-11T12:55:00Z
13
value 0.01012
scoring_system epss
scoring_elements 0.77129
published_at 2026-04-12T12:55:00Z
14
value 0.01012
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-13T12:55:00Z
15
value 0.01012
scoring_system epss
scoring_elements 0.77166
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21363
2
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:38:01Z/
url https://www.oracle.com/security-alerts/cpujan2022.html
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2047343
reference_id 2047343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2047343
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-21363
reference_id CVE-2022-21363
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-21363
5
reference_url https://github.com/advisories/GHSA-g76j-4cxx-23h9
reference_id GHSA-g76j-4cxx-23h9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g76j-4cxx-23h9
6
reference_url https://access.redhat.com/errata/RHSA-2022:4623
reference_id RHSA-2022:4623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4623
7
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
8
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
9
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
10
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
fixed_packages
aliases CVE-2022-21363, GHSA-g76j-4cxx-23h9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e37q-8shh-v7aw
1
url VCID-v45q-vzz5-4bgd
vulnerability_id VCID-v45q-vzz5-4bgd
summary wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0866.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0866
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50524
published_at 2026-04-01T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50581
published_at 2026-04-02T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50608
published_at 2026-04-04T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50561
published_at 2026-04-07T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50615
published_at 2026-04-08T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50612
published_at 2026-04-09T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50655
published_at 2026-04-11T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50632
published_at 2026-04-12T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50618
published_at 2026-04-13T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.5066
published_at 2026-04-16T12:55:00Z
10
value 0.00272
scoring_system epss
scoring_elements 0.50665
published_at 2026-04-18T12:55:00Z
11
value 0.00272
scoring_system epss
scoring_elements 0.50644
published_at 2026-04-21T12:55:00Z
12
value 0.00272
scoring_system epss
scoring_elements 0.50592
published_at 2026-04-24T12:55:00Z
13
value 0.00272
scoring_system epss
scoring_elements 0.506
published_at 2026-04-26T12:55:00Z
14
value 0.00272
scoring_system epss
scoring_elements 0.50554
published_at 2026-04-29T12:55:00Z
15
value 0.00272
scoring_system epss
scoring_elements 0.50477
published_at 2026-05-05T12:55:00Z
16
value 0.00272
scoring_system epss
scoring_elements 0.50531
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0866
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2060929
reference_id 2060929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2060929
3
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
4
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
5
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
6
reference_url https://access.redhat.com/errata/RHSA-2022:6782
reference_id RHSA-2022:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6782
7
reference_url https://access.redhat.com/errata/RHSA-2022:6783
reference_id RHSA-2022:6783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6783
8
reference_url https://access.redhat.com/errata/RHSA-2022:6787
reference_id RHSA-2022:6787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6787
9
reference_url https://access.redhat.com/errata/RHSA-2022:7409
reference_id RHSA-2022:7409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7409
10
reference_url https://access.redhat.com/errata/RHSA-2022:7410
reference_id RHSA-2022:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7410
11
reference_url https://access.redhat.com/errata/RHSA-2022:7411
reference_id RHSA-2022:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7411
12
reference_url https://access.redhat.com/errata/RHSA-2022:7417
reference_id RHSA-2022:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7417
fixed_packages
aliases CVE-2022-0866
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v45q-vzz5-4bgd
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap7-wildfly@7.4.5-3.GA_redhat_00001.1%3Farch=el7eap