Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-v3ns-1zp4-7qgx
SummaryAIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application
Aliases
0
alias CVE-2022-33124
1
alias GHSA-rwqr-c348-m5wr
2
alias PYSEC-2022-43059
Fixed_packages
Affected_packages
0
url pkg:pypi/aiohttp@3.8.1
purl pkg:pypi/aiohttp@3.8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bcuu-jvzt-6fhn
1
vulnerability VCID-bhkk-2b7c-wfgr
2
vulnerability VCID-d3pa-kwgz-vuag
3
vulnerability VCID-ft9z-nd6x-27dz
4
vulnerability VCID-jxqg-x9dh-z3hb
5
vulnerability VCID-k122-7d38-2ug5
6
vulnerability VCID-peyu-fxyx-ayde
7
vulnerability VCID-pmr9-w1fc-93cm
8
vulnerability VCID-pqus-ew4j-k7da
9
vulnerability VCID-qrus-4szm-c3bj
10
vulnerability VCID-sjws-ddnq-fke2
11
vulnerability VCID-t9gx-etxx-vkgb
12
vulnerability VCID-tn28-662n-vug8
13
vulnerability VCID-ttq3-65ny-skdg
14
vulnerability VCID-ue33-na1g-rqa7
15
vulnerability VCID-v3ns-1zp4-7qgx
16
vulnerability VCID-vqvz-jfqh-jkaz
17
vulnerability VCID-zf8d-kxf1-sqds
18
vulnerability VCID-zm3a-mf2z-xfcm
19
vulnerability VCID-zrgm-47ph-x3g3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/aiohttp@3.8.1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33124.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33124
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48501
published_at 2026-04-24T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48513
published_at 2026-04-08T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48508
published_at 2026-04-09T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48531
published_at 2026-04-11T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48504
published_at 2026-04-12T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48517
published_at 2026-04-13T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48566
published_at 2026-04-16T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48562
published_at 2026-04-18T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48519
published_at 2026-04-21T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48483
published_at 2026-04-02T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48506
published_at 2026-04-04T12:55:00Z
11
value 0.00252
scoring_system epss
scoring_elements 0.48458
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33124
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/aio-libs/aiohttp
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/aio-libs/aiohttp
4
reference_url https://github.com/aio-libs/aiohttp/issues/6772
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/aio-libs/aiohttp/issues/6772
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-33124
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-33124
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103107
reference_id 2103107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103107
7
reference_url https://github.com/advisories/GHSA-rwqr-c348-m5wr
reference_id GHSA-rwqr-c348-m5wr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rwqr-c348-m5wr
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.0 - 7.5
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-v3ns-1zp4-7qgx