Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-92ak-64hu-dbg1
Summarykube-apiserver: Aggregated API server can cause clients to be redirected (SSRF)
Aliases
0
alias CVE-2022-3172
Fixed_packages
0
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/openshift@4.10.0-202303221742.p0.g16bcd69.assembly.stream?arch=el7
purl pkg:rpm/redhat/openshift@4.10.0-202303221742.p0.g16bcd69.assembly.stream?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92ak-64hu-dbg1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.10.0-202303221742.p0.g16bcd69.assembly.stream%3Farch=el7
1
url pkg:rpm/redhat/openshift@4.11.0-202210122157.p0.g5157800.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift@4.11.0-202210122157.p0.g5157800.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92ak-64hu-dbg1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.11.0-202210122157.p0.g5157800.assembly.stream%3Farch=el8
2
url pkg:rpm/redhat/openshift@4.12.0-202301042257.p0.g77bec7a.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift@4.12.0-202301042257.p0.g77bec7a.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92ak-64hu-dbg1
1
vulnerability VCID-ea5d-jxkg-mbhn
2
vulnerability VCID-pehm-pzkq-2bdf
3
vulnerability VCID-x63z-bjr8-j7d7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.12.0-202301042257.p0.g77bec7a.assembly.stream%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3172.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3172
reference_id
reference_type
scores
0
value 0.02537
scoring_system epss
scoring_elements 0.85392
published_at 2026-04-02T12:55:00Z
1
value 0.02537
scoring_system epss
scoring_elements 0.85412
published_at 2026-04-04T12:55:00Z
2
value 0.02537
scoring_system epss
scoring_elements 0.85415
published_at 2026-04-07T12:55:00Z
3
value 0.02537
scoring_system epss
scoring_elements 0.85436
published_at 2026-04-08T12:55:00Z
4
value 0.02537
scoring_system epss
scoring_elements 0.85444
published_at 2026-04-09T12:55:00Z
5
value 0.02537
scoring_system epss
scoring_elements 0.85458
published_at 2026-04-11T12:55:00Z
6
value 0.02537
scoring_system epss
scoring_elements 0.85456
published_at 2026-04-12T12:55:00Z
7
value 0.02537
scoring_system epss
scoring_elements 0.85453
published_at 2026-04-13T12:55:00Z
8
value 0.02823
scoring_system epss
scoring_elements 0.86195
published_at 2026-04-24T12:55:00Z
9
value 0.02823
scoring_system epss
scoring_elements 0.86174
published_at 2026-04-21T12:55:00Z
10
value 0.02834
scoring_system epss
scoring_elements 0.862
published_at 2026-04-16T12:55:00Z
11
value 0.02834
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3172
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3172
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127804
reference_id 2127804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127804
5
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:1655
reference_id RHSA-2023:1655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1655
7
reference_url https://access.redhat.com/errata/RHSA-2023:3609
reference_id RHSA-2023:3609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3609
Weaknesses
0
cwe_id 918
name Server-Side Request Forgery (SSRF)
description The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Exploits
Severity_range_score5.1 - 5.1
Exploitability0.5
Weighted_severity4.6
Risk_score2.3
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-92ak-64hu-dbg1