Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99537?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99537?format=api", "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.24-2.Final_redhat_00001.1.ep6?arch=el7", "type": "rpm", "namespace": "redhat", "name": "jbossas-welcome-content-eap", "version": "7.5.24-2.Final_redhat_00001.1.ep6", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12311?format=api", "vulnerability_id": "VCID-1vfk-arae-ubha", "summary": "Deserialization of Untrusted Data in Log4j 1.x\nJMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70817", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.7081", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.7078", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70737", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70713", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/logging-log4j1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j1" }, { "reference_url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w" }, { "reference_url": "https://logging.apache.org/log4j/1.2/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://logging.apache.org/log4j/1.2/index.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220217-0006" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482", "reference_id": "1004482", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949", "reference_id": "2041949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302", "reference_id": "CVE-2022-23302", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302" }, { "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-detect-log4j-1217-vulnerability", "reference_id": "CVE-2022-23302-DETECT-LOG4J-1217-VULNERABILITY", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-detect-log4j-1217-vulnerability" }, { "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-mitigate-log4j-1217-vulnerability", "reference_id": "CVE-2022-23302-MITIGATE-LOG4J-1217-VULNERABILITY", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-mitigate-log4j-1217-vulnerability" }, { "reference_url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj", "reference_id": "GHSA-w9p3-5cr8-m3jj", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj" }, { "reference_url": "https://security.gentoo.org/glsa/202402-16", "reference_id": "GLSA-202402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289", "reference_id": "RHSA-2022:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290", "reference_id": "RHSA-2022:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291", "reference_id": "RHSA-2022:0291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294", "reference_id": "RHSA-2022:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430", "reference_id": "RHSA-2022:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435", "reference_id": "RHSA-2022:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436", "reference_id": "RHSA-2022:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437", "reference_id": "RHSA-2022:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438", "reference_id": "RHSA-2022:0438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439", "reference_id": "RHSA-2022:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442", "reference_id": "RHSA-2022:0442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444", "reference_id": "RHSA-2022:0444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445", "reference_id": "RHSA-2022:0445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446", "reference_id": "RHSA-2022:0446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447", "reference_id": "RHSA-2022:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448", "reference_id": "RHSA-2022:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449", "reference_id": "RHSA-2022:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450", "reference_id": "RHSA-2022:0450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467", "reference_id": "RHSA-2022:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469", "reference_id": "RHSA-2022:0469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475", "reference_id": "RHSA-2022:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497", "reference_id": "RHSA-2022:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507", "reference_id": "RHSA-2022:0507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524", "reference_id": "RHSA-2022:0524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527", "reference_id": "RHSA-2022:0527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553", "reference_id": "RHSA-2022:0553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661", "reference_id": "RHSA-2022:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296", "reference_id": "RHSA-2022:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297", "reference_id": "RHSA-2022:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299", "reference_id": "RHSA-2022:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856", "reference_id": "RHSA-2024:5856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "reference_url": "https://usn.ubuntu.com/5998-1/", "reference_id": "USN-5998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5998-1/" }, { "reference_url": "https://usn.ubuntu.com/7590-1/", "reference_id": "USN-7590-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7590-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23302", "GHSA-w9p3-5cr8-m3jj" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vfk-arae-ubha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11784?format=api", "vulnerability_id": "VCID-698m-2hju-2qcv", "summary": "Deserialization of Untrusted Data\nJMSAppender in Log4j is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide `TopicBindingName` and `TopicConnectionFactoryBindingName` configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j when specifically configured to use JMSAppender, which is not the default. Apache Log4j reached end of life in August Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98646", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98635", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98641", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/logging-log4j2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j2" }, { "reference_url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033" }, { "reference_url": "https://security.gentoo.org/glsa/202209-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "reference_url": "https://security.gentoo.org/glsa/202310-16", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202310-16" }, { "reference_url": "https://security.gentoo.org/glsa/202312-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202312-04" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20211223-0007" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20211223-0007/" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2021-44228", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "reference_url": "https://www.kb.cert.org/vuls/id/930724", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.kb.cert.org/vuls/id/930724" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667", "reference_id": "2031667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2021-4104", "reference_id": "CVE-2021-4104", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "reference_id": "CVE-2021-4104", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "reference_url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333", "reference_id": "GHSA-fp5r-v3w9-4333", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333" }, { "reference_url": "https://security.gentoo.org/glsa/202312-02", "reference_id": "GLSA-202312-02", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202312-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5107", "reference_id": "RHSA-2021:5107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5141", "reference_id": "RHSA-2021:5141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5148", "reference_id": "RHSA-2021:5148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5183", "reference_id": "RHSA-2021:5183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5184", "reference_id": "RHSA-2021:5184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5186", "reference_id": "RHSA-2021:5186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5206", "reference_id": "RHSA-2021:5206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5269", "reference_id": "RHSA-2021:5269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289", "reference_id": "RHSA-2022:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290", "reference_id": "RHSA-2022:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291", "reference_id": "RHSA-2022:0291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294", "reference_id": "RHSA-2022:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430", "reference_id": "RHSA-2022:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435", "reference_id": "RHSA-2022:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436", "reference_id": "RHSA-2022:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437", "reference_id": "RHSA-2022:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438", "reference_id": "RHSA-2022:0438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444", "reference_id": "RHSA-2022:0444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445", "reference_id": "RHSA-2022:0445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446", "reference_id": "RHSA-2022:0446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447", "reference_id": "RHSA-2022:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448", "reference_id": "RHSA-2022:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449", "reference_id": "RHSA-2022:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450", "reference_id": "RHSA-2022:0450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475", "reference_id": "RHSA-2022:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497", "reference_id": "RHSA-2022:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507", "reference_id": "RHSA-2022:0507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524", "reference_id": "RHSA-2022:0524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527", "reference_id": "RHSA-2022:0527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553", "reference_id": "RHSA-2022:0553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661", "reference_id": "RHSA-2022:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296", "reference_id": "RHSA-2022:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297", "reference_id": "RHSA-2022:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299", "reference_id": "RHSA-2022:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856", "reference_id": "RHSA-2024:5856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "reference_url": "https://usn.ubuntu.com/5223-1/", "reference_id": "USN-5223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5223-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5223-2/", "reference_id": "USN-USN-5223-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5223-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-4104", "GHSA-fp5r-v3w9-4333" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-698m-2hju-2qcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12203?format=api", "vulnerability_id": "VCID-9k99-jzq8-fyge", "summary": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nBy design, the JDBCAppender in Log4j accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j when specifically configured to use the JDBCAppender, which is not the default. Beginning, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j reached end of life in August Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92074", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92077", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.9205", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07951", "scoring_system": "epss", "scoring_elements": "0.92037", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/logging-log4j1", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j1" }, { "reference_url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y" }, { "reference_url": "https://logging.apache.org/log4j/1.2/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://logging.apache.org/log4j/1.2/index.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0007", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220217-0007" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220217-0007/" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2022/01/18/4" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482", "reference_id": "1004482", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959", "reference_id": "2041959", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "reference_id": "CVE-2022-23305", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "reference_url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3", "reference_id": "GHSA-65fg-84f6-3jq3", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3" }, { "reference_url": "https://security.gentoo.org/glsa/202402-16", "reference_id": "GLSA-202402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289", "reference_id": "RHSA-2022:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290", "reference_id": "RHSA-2022:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291", "reference_id": "RHSA-2022:0291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294", "reference_id": "RHSA-2022:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430", "reference_id": "RHSA-2022:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435", "reference_id": "RHSA-2022:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436", "reference_id": "RHSA-2022:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437", "reference_id": "RHSA-2022:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438", "reference_id": "RHSA-2022:0438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439", "reference_id": "RHSA-2022:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442", "reference_id": "RHSA-2022:0442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444", "reference_id": "RHSA-2022:0444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445", "reference_id": "RHSA-2022:0445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446", "reference_id": "RHSA-2022:0446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447", "reference_id": "RHSA-2022:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448", "reference_id": "RHSA-2022:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449", "reference_id": "RHSA-2022:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450", "reference_id": "RHSA-2022:0450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467", "reference_id": "RHSA-2022:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469", "reference_id": "RHSA-2022:0469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475", "reference_id": "RHSA-2022:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497", "reference_id": "RHSA-2022:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507", "reference_id": "RHSA-2022:0507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524", "reference_id": "RHSA-2022:0524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527", "reference_id": "RHSA-2022:0527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553", "reference_id": "RHSA-2022:0553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661", "reference_id": "RHSA-2022:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296", "reference_id": "RHSA-2022:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297", "reference_id": "RHSA-2022:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299", "reference_id": "RHSA-2022:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856", "reference_id": "RHSA-2024:5856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "reference_url": "https://usn.ubuntu.com/5998-1/", "reference_id": "USN-5998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5998-1/" }, { "reference_url": "https://usn.ubuntu.com/7590-1/", "reference_id": "USN-7590-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7590-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23305", "GHSA-65fg-84f6-3jq3" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9k99-jzq8-fyge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12208?format=api", "vulnerability_id": "VCID-bbq3-tx7c-yucn", "summary": "This advisory has been marked as False Positive and removed.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84287", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84273", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84249", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84227", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02155", "scoring_system": "epss", "scoring_elements": "0.84208", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh" }, { "reference_url": "https://logging.apache.org/log4j/1.2/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://logging.apache.org/log4j/1.2/index.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482", "reference_id": "1004482", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967", "reference_id": "2041967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "reference_id": "CVE-2022-23307", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "reference_url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m", "reference_id": "GHSA-f7vh-qwp3-x37m", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289", "reference_id": "RHSA-2022:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290", "reference_id": "RHSA-2022:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291", "reference_id": "RHSA-2022:0291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294", "reference_id": "RHSA-2022:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430", "reference_id": "RHSA-2022:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435", "reference_id": "RHSA-2022:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436", "reference_id": "RHSA-2022:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437", "reference_id": "RHSA-2022:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438", "reference_id": "RHSA-2022:0438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439", "reference_id": "RHSA-2022:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442", "reference_id": "RHSA-2022:0442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444", "reference_id": "RHSA-2022:0444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445", "reference_id": "RHSA-2022:0445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446", "reference_id": "RHSA-2022:0446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447", "reference_id": "RHSA-2022:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448", "reference_id": "RHSA-2022:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449", "reference_id": "RHSA-2022:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450", "reference_id": "RHSA-2022:0450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467", "reference_id": "RHSA-2022:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469", "reference_id": "RHSA-2022:0469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475", "reference_id": "RHSA-2022:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497", "reference_id": "RHSA-2022:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507", "reference_id": "RHSA-2022:0507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524", "reference_id": "RHSA-2022:0524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527", "reference_id": "RHSA-2022:0527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553", "reference_id": "RHSA-2022:0553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661", "reference_id": "RHSA-2022:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296", "reference_id": "RHSA-2022:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297", "reference_id": "RHSA-2022:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299", "reference_id": "RHSA-2022:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856", "reference_id": "RHSA-2024:5856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "reference_url": "https://usn.ubuntu.com/5998-1/", "reference_id": "USN-5998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5998-1/" }, { "reference_url": "https://usn.ubuntu.com/7590-1/", "reference_id": "USN-7590-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7590-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23307", "GHSA-f7vh-qwp3-x37m" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bbq3-tx7c-yucn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80940?format=api", "vulnerability_id": "VCID-h1pw-28zg-mkae", "summary": "jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55573", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55596", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875176", "reference_id": "1875176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3730", "reference_id": "RHSA-2020:3730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3731", "reference_id": "RHSA-2020:3731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14384" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1pw-28zg-mkae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4468?format=api", "vulnerability_id": "VCID-nvbx-q971-skgm", "summary": "The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13935.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13935.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13935", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99685", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.99681", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.91745", "scoring_system": "epss", "scoring_elements": "0.9968", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13935" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5" }, { "reference_url": "https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3" }, { "reference_url": "https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d" }, { "reference_url": "https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784" }, { "reference_url": "https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332" }, { "reference_url": "https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200724-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200724-0003" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200724-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200724-0003/" }, { "reference_url": "https://tomcat.apache.org/security-10.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-10.html" }, { "reference_url": "https://tomcat.apache.org/security-7.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-7.html" }, { "reference_url": "https://tomcat.apache.org/security-8.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-8.html" }, { "reference_url": "https://tomcat.apache.org/security-9.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-9.html" }, { "reference_url": "https://usn.ubuntu.com/4448-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://usn.ubuntu.com/4448-1" }, { "reference_url": "https://usn.ubuntu.com/4448-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4448-1/" }, { "reference_url": "https://usn.ubuntu.com/4596-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://usn.ubuntu.com/4596-1" }, { "reference_url": "https://usn.ubuntu.com/4596-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4596-1/" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4727", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2020/dsa-4727" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857024", "reference_id": "1857024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857024" }, { "reference_url": "https://security.archlinux.org/AVG-1205", "reference_id": "AVG-1205", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935", "reference_id": "CVE-2020-13935", "reference_type": "", "scores": [ { "value": "Important", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13935", "reference_id": "CVE-2020-13935", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13935" }, { "reference_url": "https://github.com/advisories/GHSA-m7jv-hq7h-mq7c", "reference_id": "GHSA-m7jv-hq7h-mq7c", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-m7jv-hq7h-mq7c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3303", "reference_id": "RHSA-2020:3303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3305", "reference_id": "RHSA-2020:3305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3306", "reference_id": "RHSA-2020:3306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3308", "reference_id": "RHSA-2020:3308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3382", "reference_id": "RHSA-2020:3382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3383", "reference_id": "RHSA-2020:3383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3806", "reference_id": "RHSA-2020:3806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4004", "reference_id": "RHSA-2020:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" } ], "fixed_packages": [], "aliases": [ "CVE-2020-13935", "GHSA-m7jv-hq7h-mq7c" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvbx-q971-skgm" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.24-2.Final_redhat_00001.1.ep6%3Farch=el7" }