Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-5q6k-7hu5-w3ez
Summary
github.com/openshift/apiserver-library-go Improper Input Validation vulnerability
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
Aliases
0
alias CVE-2023-0229
1
alias GHSA-5465-xc2j-6p84
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/microshift@4.12.6-202303012057.p0.g50997a2.assembly.4.12.6?arch=el8
purl pkg:rpm/redhat/microshift@4.12.6-202303012057.p0.g50997a2.assembly.4.12.6?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5q6k-7hu5-w3ez
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.12.6-202303012057.p0.g50997a2.assembly.4.12.6%3Farch=el8
1
url pkg:rpm/redhat/openshift@4.13.0-202304211155.p0.gb404935.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift@4.13.0-202304211155.p0.gb404935.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kkq-5jpf-fqev
1
vulnerability VCID-5q6k-7hu5-w3ez
2
vulnerability VCID-pehm-pzkq-2bdf
3
vulnerability VCID-sdd3-35ng-g7a3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.13.0-202304211155.p0.gb404935.assembly.stream%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0229.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0229
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27652
published_at 2026-04-21T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27902
published_at 2026-04-04T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27693
published_at 2026-04-07T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-08T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27803
published_at 2026-04-09T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27808
published_at 2026-04-11T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27767
published_at 2026-04-12T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27709
published_at 2026-04-13T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27717
published_at 2026-04-16T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27692
published_at 2026-04-18T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27861
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0229
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160349
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T15:07:10Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2160349
3
reference_url https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6
4
reference_url https://github.com/openshift/apiserver-library-go/pull/97
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openshift/apiserver-library-go/pull/97
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-0229
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-0229
6
reference_url https://access.redhat.com/errata/RHSA-2023:1325
reference_id RHSA-2023:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1325
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-5q6k-7hu5-w3ez