Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-k4dy-pv3f-4qas
SummaryMultiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
Aliases
0
alias CVE-2022-30629
Fixed_packages
0
url pkg:apk/alpine/go@1.18.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
1
url pkg:apk/alpine/go@1.18.4-r0?arch=aarch64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=aarch64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=aarch64&distroversion=v3.16&reponame=community
2
url pkg:apk/alpine/go@1.18.4-r0?arch=armv7&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=armv7&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armv7&distroversion=v3.16&reponame=community
3
url pkg:apk/alpine/go@1.18.4-r0?arch=ppc64le&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=ppc64le&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=community
4
url pkg:apk/alpine/go@1.18.4-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
5
url pkg:apk/alpine/go@1.18.4-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armhf&distroversion=v3.16&reponame=community
6
url pkg:apk/alpine/go@1.18.4-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/go@1.18.4-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=s390x&distroversion=v3.16&reponame=community
7
url pkg:ebuild/dev-lang/go@1.18.5
purl pkg:ebuild/dev-lang/go@1.18.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/go@1.18.5
Affected_packages
0
url pkg:rpm/redhat/buildah@1:1.29.1-1?arch=el9
purl pkg:rpm/redhat/buildah@1:1.29.1-1?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kkq-5jpf-fqev
1
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-1%3Farch=el9
1
url pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11?arch=el8
purl pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11%3Farch=el8
2
url pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1?arch=el9
purl pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kkq-5jpf-fqev
1
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1%3Farch=el9
3
url pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df?arch=el8
purl pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df%3Farch=el8
4
url pkg:rpm/redhat/cri-tools@1.24.2-6?arch=el8
purl pkg:rpm/redhat/cri-tools@1.24.2-6?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.24.2-6%3Farch=el8
5
url pkg:rpm/redhat/etcd@3.3.23-12?arch=el8ost
purl pkg:rpm/redhat/etcd@3.3.23-12?arch=el8ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rsj-pm1p-qbd6
1
vulnerability VCID-498g-zap2-vqag
2
vulnerability VCID-5kkq-5jpf-fqev
3
vulnerability VCID-6189-d1tw-bfcp
4
vulnerability VCID-65mk-w8rx-zucs
5
vulnerability VCID-81aw-mk9s-eydd
6
vulnerability VCID-azr4-u36f-pbew
7
vulnerability VCID-g8y7-jdy7-afdh
8
vulnerability VCID-k4dy-pv3f-4qas
9
vulnerability VCID-ps89-8u5a-kfc8
10
vulnerability VCID-rtb8-bayb-dfbn
11
vulnerability VCID-tn6y-xfkz-83e4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.3.23-12%3Farch=el8ost
6
url pkg:rpm/redhat/golang@1.17.12-1?arch=el9_0
purl pkg:rpm/redhat/golang@1.17.12-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-498g-zap2-vqag
1
vulnerability VCID-5c67-zpsw-cyb2
2
vulnerability VCID-6189-d1tw-bfcp
3
vulnerability VCID-7e1n-pvrt-g3fy
4
vulnerability VCID-81aw-mk9s-eydd
5
vulnerability VCID-86mk-kwg6-63h6
6
vulnerability VCID-as38-uuy9-5qhu
7
vulnerability VCID-dsm8-ck8e-wfdh
8
vulnerability VCID-g8y7-jdy7-afdh
9
vulnerability VCID-k4dy-pv3f-4qas
10
vulnerability VCID-mnxk-x51q-wkfp
11
vulnerability VCID-ps89-8u5a-kfc8
12
vulnerability VCID-vxks-1bkp-6bd5
13
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.17.12-1%3Farch=el9_0
7
url pkg:rpm/redhat/go-toolset@1.17.12-1?arch=el9_0
purl pkg:rpm/redhat/go-toolset@1.17.12-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7e1n-pvrt-g3fy
1
vulnerability VCID-dsm8-ck8e-wfdh
2
vulnerability VCID-k4dy-pv3f-4qas
3
vulnerability VCID-mnxk-x51q-wkfp
4
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset@1.17.12-1%3Farch=el9_0
8
url pkg:rpm/redhat/go-toolset-1.17@1.17.12-1?arch=el7_9
purl pkg:rpm/redhat/go-toolset-1.17@1.17.12-1?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17@1.17.12-1%3Farch=el7_9
9
url pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1?arch=el7_9
purl pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-498g-zap2-vqag
1
vulnerability VCID-5c67-zpsw-cyb2
2
vulnerability VCID-6189-d1tw-bfcp
3
vulnerability VCID-81aw-mk9s-eydd
4
vulnerability VCID-86mk-kwg6-63h6
5
vulnerability VCID-as38-uuy9-5qhu
6
vulnerability VCID-g8y7-jdy7-afdh
7
vulnerability VCID-k4dy-pv3f-4qas
8
vulnerability VCID-ps89-8u5a-kfc8
9
vulnerability VCID-vxks-1bkp-6bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1%3Farch=el7_9
10
url pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11?arch=el8
purl pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11%3Farch=el8
11
url pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el8
purl pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dh6-y93r-2ucc
1
vulnerability VCID-2zj9-xmsh-xbcn
2
vulnerability VCID-498g-zap2-vqag
3
vulnerability VCID-5c67-zpsw-cyb2
4
vulnerability VCID-6189-d1tw-bfcp
5
vulnerability VCID-7e1n-pvrt-g3fy
6
vulnerability VCID-81aw-mk9s-eydd
7
vulnerability VCID-86mk-kwg6-63h6
8
vulnerability VCID-as38-uuy9-5qhu
9
vulnerability VCID-g8y7-jdy7-afdh
10
vulnerability VCID-k4dy-pv3f-4qas
11
vulnerability VCID-ps89-8u5a-kfc8
12
vulnerability VCID-vxks-1bkp-6bd5
13
vulnerability VCID-w53f-uad6-gqdn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el8
12
url pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el7
purl pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dh6-y93r-2ucc
1
vulnerability VCID-2zj9-xmsh-xbcn
2
vulnerability VCID-498g-zap2-vqag
3
vulnerability VCID-5c67-zpsw-cyb2
4
vulnerability VCID-6189-d1tw-bfcp
5
vulnerability VCID-7e1n-pvrt-g3fy
6
vulnerability VCID-81aw-mk9s-eydd
7
vulnerability VCID-86mk-kwg6-63h6
8
vulnerability VCID-as38-uuy9-5qhu
9
vulnerability VCID-g8y7-jdy7-afdh
10
vulnerability VCID-k4dy-pv3f-4qas
11
vulnerability VCID-ps89-8u5a-kfc8
12
vulnerability VCID-vxks-1bkp-6bd5
13
vulnerability VCID-w53f-uad6-gqdn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el7
13
url pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4?arch=el8
purl pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-498g-zap2-vqag
1
vulnerability VCID-5c67-zpsw-cyb2
2
vulnerability VCID-6189-d1tw-bfcp
3
vulnerability VCID-7e1n-pvrt-g3fy
4
vulnerability VCID-81aw-mk9s-eydd
5
vulnerability VCID-86mk-kwg6-63h6
6
vulnerability VCID-as38-uuy9-5qhu
7
vulnerability VCID-dsm8-ck8e-wfdh
8
vulnerability VCID-f5qg-jth9-hycf
9
vulnerability VCID-g8y7-jdy7-afdh
10
vulnerability VCID-k4dy-pv3f-4qas
11
vulnerability VCID-ps89-8u5a-kfc8
12
vulnerability VCID-vxks-1bkp-6bd5
13
vulnerability VCID-wqqa-tzs4-kugj
14
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4%3Farch=el8
14
url pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11?arch=el8
purl pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a473-9skg-tkbn
1
vulnerability VCID-k4dy-pv3f-4qas
2
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11%3Farch=el8
15
url pkg:rpm/redhat/podman@2:4.4.1-3?arch=el9
purl pkg:rpm/redhat/podman@2:4.4.1-3?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kkq-5jpf-fqev
1
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-3%3Farch=el9
16
url pkg:rpm/redhat/servicemesh@2.1.5-1?arch=el8
purl pkg:rpm/redhat/servicemesh@2.1.5-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7e1n-pvrt-g3fy
1
vulnerability VCID-dsm8-ck8e-wfdh
2
vulnerability VCID-k4dy-pv3f-4qas
3
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.1.5-1%3Farch=el8
17
url pkg:rpm/redhat/servicemesh-operator@2.1.5-1?arch=el8
purl pkg:rpm/redhat/servicemesh-operator@2.1.5-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dsm8-ck8e-wfdh
1
vulnerability VCID-k4dy-pv3f-4qas
2
vulnerability VCID-mnxk-x51q-wkfp
3
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-operator@2.1.5-1%3Farch=el8
18
url pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9?arch=el8
purl pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dsm8-ck8e-wfdh
1
vulnerability VCID-k4dy-pv3f-4qas
2
vulnerability VCID-kexn-gjxj-uudm
3
vulnerability VCID-mnxk-x51q-wkfp
4
vulnerability VCID-ptd4-8f7f-hyg6
5
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9%3Farch=el8
19
url pkg:rpm/redhat/servicemesh-proxy@2.1.5-1?arch=el8
purl pkg:rpm/redhat/servicemesh-proxy@2.1.5-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-proxy@2.1.5-1%3Farch=el8
20
url pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1?arch=el8
purl pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dsm8-ck8e-wfdh
1
vulnerability VCID-k4dy-pv3f-4qas
2
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1%3Farch=el8
21
url pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11?arch=el8
purl pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a473-9skg-tkbn
1
vulnerability VCID-k4dy-pv3f-4qas
2
vulnerability VCID-yzsx-6acm-kkb6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11%3Farch=el8
22
url pkg:rpm/redhat/skopeo@2:1.11.2-0.1?arch=el9
purl pkg:rpm/redhat/skopeo@2:1.11.2-0.1?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kkq-5jpf-fqev
1
vulnerability VCID-k4dy-pv3f-4qas
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-0.1%3Farch=el9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30629
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20536
published_at 2026-04-02T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20373
published_at 2026-04-21T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20595
published_at 2026-04-04T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20324
published_at 2026-04-07T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20405
published_at 2026-04-08T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20462
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20487
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20441
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20385
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20374
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20376
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092793
reference_id 2092793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092793
5
reference_url https://go.dev/cl/405994
reference_id 405994
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/
url https://go.dev/cl/405994
6
reference_url https://go.dev/issue/52814
reference_id 52814
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/
url https://go.dev/issue/52814
7
reference_url https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5
reference_id fe4de36198794c447fbd9d7cc2d7199a506c76a5
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/
url https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5
8
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
9
reference_url https://pkg.go.dev/vuln/GO-2022-0531
reference_id GO-2022-0531
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/
url https://pkg.go.dev/vuln/GO-2022-0531
10
reference_url https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
reference_id IWz5T6x7AAAJ
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/
url https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
11
reference_url https://access.redhat.com/errata/RHSA-2022:5775
reference_id RHSA-2022:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5775
12
reference_url https://access.redhat.com/errata/RHSA-2022:5799
reference_id RHSA-2022:5799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5799
13
reference_url https://access.redhat.com/errata/RHSA-2022:5866
reference_id RHSA-2022:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5866
14
reference_url https://access.redhat.com/errata/RHSA-2022:6040
reference_id RHSA-2022:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6040
15
reference_url https://access.redhat.com/errata/RHSA-2022:6042
reference_id RHSA-2022:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6042
16
reference_url https://access.redhat.com/errata/RHSA-2022:6102
reference_id RHSA-2022:6102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6102
17
reference_url https://access.redhat.com/errata/RHSA-2022:6103
reference_id RHSA-2022:6103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6103
18
reference_url https://access.redhat.com/errata/RHSA-2022:6152
reference_id RHSA-2022:6152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6152
19
reference_url https://access.redhat.com/errata/RHSA-2022:6277
reference_id RHSA-2022:6277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6277
20
reference_url https://access.redhat.com/errata/RHSA-2022:6290
reference_id RHSA-2022:6290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6290
21
reference_url https://access.redhat.com/errata/RHSA-2022:6430
reference_id RHSA-2022:6430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6430
22
reference_url https://access.redhat.com/errata/RHSA-2022:6535
reference_id RHSA-2022:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6535
23
reference_url https://access.redhat.com/errata/RHSA-2022:9047
reference_id RHSA-2022:9047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9047
24
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
25
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
26
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
27
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
28
reference_url https://access.redhat.com/errata/RHSA-2023:2253
reference_id RHSA-2023:2253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2253
29
reference_url https://access.redhat.com/errata/RHSA-2023:2282
reference_id RHSA-2023:2282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2282
30
reference_url https://access.redhat.com/errata/RHSA-2023:2283
reference_id RHSA-2023:2283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2283
31
reference_url https://access.redhat.com/errata/RHSA-2023:2367
reference_id RHSA-2023:2367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2367
32
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
33
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
34
reference_url https://access.redhat.com/errata/RHSA-2023:3914
reference_id RHSA-2023:3914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3914
35
reference_url https://access.redhat.com/errata/RHSA-2023:4488
reference_id RHSA-2023:4488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4488
36
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
37
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
Weaknesses
0
cwe_id 331
name Insufficient Entropy
description The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
1
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score3.1 - 3.7
Exploitability0.5
Weighted_severity2.8
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-k4dy-pv3f-4qas