Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ad5y-3exv-y7bq
Summaryistio: Unauthenticated control plane denial of service attack due to stack exhaustion
Aliases
0
alias CVE-2022-24726
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/servicemesh@2.0.9-3?arch=el8
purl pkg:rpm/redhat/servicemesh@2.0.9-3?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63v8-dt23-9ue7
1
vulnerability VCID-ad5y-3exv-y7bq
2
vulnerability VCID-esea-tj2b-h7ey
3
vulnerability VCID-hvfd-h9rm-jkbw
4
vulnerability VCID-qn4v-xah4-fya7
5
vulnerability VCID-r52s-2crw-tfbx
6
vulnerability VCID-xref-9byg-nkdw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.0.9-3%3Farch=el8
1
url pkg:rpm/redhat/servicemesh@2.1.2-4?arch=el8
purl pkg:rpm/redhat/servicemesh@2.1.2-4?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ad5y-3exv-y7bq
1
vulnerability VCID-xref-9byg-nkdw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.1.2-4%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24726.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24726
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61288
published_at 2026-04-02T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61355
published_at 2026-04-29T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61335
published_at 2026-04-13T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61374
published_at 2026-04-16T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61378
published_at 2026-04-18T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61358
published_at 2026-04-21T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61347
published_at 2026-04-24T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61362
published_at 2026-04-26T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61317
published_at 2026-04-04T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61285
published_at 2026-04-07T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.61333
published_at 2026-04-08T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.61348
published_at 2026-04-09T12:55:00Z
12
value 0.0041
scoring_system epss
scoring_elements 0.61368
published_at 2026-04-11T12:55:00Z
13
value 0.0041
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24726
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2061638
reference_id 2061638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2061638
3
reference_url https://github.com/golang/go/issues/51112
reference_id 51112
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:46Z/
url https://github.com/golang/go/issues/51112
4
reference_url https://github.com/istio/istio/commit/6ca5055a4db6695ef5504eabdfde3799f2ea91fd
reference_id 6ca5055a4db6695ef5504eabdfde3799f2ea91fd
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:46Z/
url https://github.com/istio/istio/commit/6ca5055a4db6695ef5504eabdfde3799f2ea91fd
5
reference_url https://github.com/istio/istio/security/advisories/GHSA-8w5h-qr4r-2h6g
reference_id GHSA-8w5h-qr4r-2h6g
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:46Z/
url https://github.com/istio/istio/security/advisories/GHSA-8w5h-qr4r-2h6g
6
reference_url https://access.redhat.com/errata/RHSA-2022:1275
reference_id RHSA-2022:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1275
7
reference_url https://access.redhat.com/errata/RHSA-2022:1276
reference_id RHSA-2022:1276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1276
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ad5y-3exv-y7bq