Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-met8-vmhb-cueu
SummaryMultiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service.
Aliases
0
alias CVE-2022-29153
1
alias GHSA-q6h7-4qgw-2j9p
Fixed_packages
0
url pkg:ebuild/app-admin/consul@1.9.17
purl pkg:ebuild/app-admin/consul@1.9.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/consul@1.9.17
1
url pkg:golang/github.com/hashicorp/consul@1.9.17
purl pkg:golang/github.com/hashicorp/consul@1.9.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/consul@1.9.17
2
url pkg:golang/github.com/hashicorp/consul@1.10.10
purl pkg:golang/github.com/hashicorp/consul@1.10.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/consul@1.10.10
3
url pkg:golang/github.com/hashicorp/consul@1.11.5
purl pkg:golang/github.com/hashicorp/consul@1.11.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/consul@1.11.5
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29153.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29153
reference_id
reference_type
scores
0
value 0.87755
scoring_system epss
scoring_elements 0.99474
published_at 2026-04-21T12:55:00Z
1
value 0.87755
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-02T12:55:00Z
2
value 0.87755
scoring_system epss
scoring_elements 0.99473
published_at 2026-04-16T12:55:00Z
3
value 0.87755
scoring_system epss
scoring_elements 0.9947
published_at 2026-04-13T12:55:00Z
4
value 0.87755
scoring_system epss
scoring_elements 0.99469
published_at 2026-04-11T12:55:00Z
5
value 0.87755
scoring_system epss
scoring_elements 0.99468
published_at 2026-04-09T12:55:00Z
6
value 0.87755
scoring_system epss
scoring_elements 0.99466
published_at 2026-04-07T12:55:00Z
7
value 0.87755
scoring_system epss
scoring_elements 0.99465
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29153
3
reference_url https://discuss.hashicorp.com
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://discuss.hashicorp.com
4
reference_url https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery
5
reference_url https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
6
reference_url https://github.com/hashicorp/consul
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hashicorp/consul
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29153
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29153
10
reference_url https://security.gentoo.org/glsa/202208-09
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202208-09
11
reference_url https://security.netapp.com/advisory/ntap-20220602-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220602-0005
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017982
reference_id 1017982
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017982
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134570
reference_id 2134570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134570
Weaknesses
0
cwe_id 918
name Server-Side Request Forgery (SSRF)
description The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Exploits
Severity_range_score7.0 - 8.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-met8-vmhb-cueu