Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namexwayland
Version22.1.6-r0
Qualifiers
arch armhf
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version22.1.8-r0
Latest_non_vulnerable_version23.1.2-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-28er-gwh3-rugq
vulnerability_id VCID-28er-gwh3-rugq
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-13T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-12T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.3402
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33989
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33947
published_at 2026-04-07T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-04T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-29T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35239
published_at 2026-04-16T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35225
published_at 2026-04-18T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-21T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-24T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
reference_id 2151757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46342
reference_id CVE-2022-46342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://access.redhat.com/security/cve/CVE-2022-46342
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:21:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-46342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28er-gwh3-rugq
1
url VCID-44yr-b94s-nfd5
vulnerability_id VCID-44yr-b94s-nfd5
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
reference_id
reference_type
scores
0
value 0.0113
scoring_system epss
scoring_elements 0.78262
published_at 2026-04-02T12:55:00Z
1
value 0.0113
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-04T12:55:00Z
2
value 0.0113
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-07T12:55:00Z
3
value 0.0113
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-08T12:55:00Z
4
value 0.0113
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-09T12:55:00Z
5
value 0.0113
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-11T12:55:00Z
6
value 0.0113
scoring_system epss
scoring_elements 0.78316
published_at 2026-04-12T12:55:00Z
7
value 0.0113
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-13T12:55:00Z
8
value 0.01202
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-29T12:55:00Z
9
value 0.01202
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-16T12:55:00Z
10
value 0.01202
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-18T12:55:00Z
11
value 0.01202
scoring_system epss
scoring_elements 0.78951
published_at 2026-04-21T12:55:00Z
12
value 0.01202
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-24T12:55:00Z
13
value 0.01202
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
reference_id 2151755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151755
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-46340
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44yr-b94s-nfd5
2
url VCID-a4bk-m98g-93f8
vulnerability_id VCID-a4bk-m98g-93f8
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-02T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-04T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-07T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-13T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-12T12:55:00Z
7
value 0.00966
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-29T12:55:00Z
8
value 0.00966
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-16T12:55:00Z
9
value 0.00966
scoring_system epss
scoring_elements 0.76622
published_at 2026-04-18T12:55:00Z
10
value 0.00966
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-21T12:55:00Z
11
value 0.00966
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-24T12:55:00Z
12
value 0.00966
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
reference_id 2151760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151760
11
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
url https://security.gentoo.org/glsa/202305-30
12
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
13
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
14
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
15
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
16
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
17
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
18
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
19
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
20
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
21
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
22
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-46344
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4bk-m98g-93f8
3
url VCID-e7w3-3hpm-hbec
vulnerability_id VCID-e7w3-3hpm-hbec
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-12T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39146
published_at 2026-04-11T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39135
published_at 2026-04-09T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39118
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-02T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-13T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40281
published_at 2026-04-29T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
11
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
12
value 0.00187
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-24T12:55:00Z
13
value 0.00187
scoring_system epss
scoring_elements 0.40362
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
reference_id 2151761
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151761
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-4283
reference_id CVE-2022-4283
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://access.redhat.com/security/cve/CVE-2022-4283
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T15:16:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-4283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7w3-3hpm-hbec
4
url VCID-jrx7-pbf3-h3at
vulnerability_id VCID-jrx7-pbf3-h3at
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
reference_id 2151756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151756
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46341
reference_id CVE-2022-46341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://access.redhat.com/security/cve/CVE-2022-46341
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:53:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-46341
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrx7-pbf3-h3at
5
url VCID-uxsy-k3cg-mkdd
vulnerability_id VCID-uxsy-k3cg-mkdd
summary Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-12T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-08T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-13T12:55:00Z
8
value 0.01181
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-29T12:55:00Z
9
value 0.01181
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-16T12:55:00Z
10
value 0.01181
scoring_system epss
scoring_elements 0.78778
published_at 2026-04-18T12:55:00Z
11
value 0.01181
scoring_system epss
scoring_elements 0.78774
published_at 2026-04-21T12:55:00Z
12
value 0.01181
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-24T12:55:00Z
13
value 0.01181
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
reference_id 1026071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026071
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
reference_id 2151758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2151758
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
reference_id 5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
12
reference_url https://access.redhat.com/security/cve/CVE-2022-46343
reference_id CVE-2022-46343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://access.redhat.com/security/cve/CVE-2022-46343
13
reference_url https://www.debian.org/security/2022/dsa-5304
reference_id dsa-5304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://www.debian.org/security/2022/dsa-5304
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
reference_id DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
15
reference_url https://security.gentoo.org/glsa/202305-30
reference_id GLSA-202305-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://security.gentoo.org/glsa/202305-30
16
reference_url https://access.redhat.com/errata/RHSA-2023:0045
reference_id RHSA-2023:0045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0045
17
reference_url https://access.redhat.com/errata/RHSA-2023:0046
reference_id RHSA-2023:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0046
18
reference_url https://access.redhat.com/errata/RHSA-2023:2248
reference_id RHSA-2023:2248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2248
19
reference_url https://access.redhat.com/errata/RHSA-2023:2249
reference_id RHSA-2023:2249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2249
20
reference_url https://access.redhat.com/errata/RHSA-2023:2257
reference_id RHSA-2023:2257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2257
21
reference_url https://access.redhat.com/errata/RHSA-2023:2805
reference_id RHSA-2023:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2805
22
reference_url https://access.redhat.com/errata/RHSA-2023:2806
reference_id RHSA-2023:2806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2806
23
reference_url https://access.redhat.com/errata/RHSA-2023:2830
reference_id RHSA-2023:2830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2830
24
reference_url https://access.redhat.com/errata/RHSA-2025:12751
reference_id RHSA-2025:12751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12751
25
reference_url https://usn.ubuntu.com/5778-1/
reference_id USN-5778-1
reference_type
scores
url https://usn.ubuntu.com/5778-1/
26
reference_url https://usn.ubuntu.com/5778-2/
reference_id USN-5778-2
reference_type
scores
url https://usn.ubuntu.com/5778-2/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
reference_id Z67QC4C3I2FI2WRFIUPEHKC36J362MLA
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T15:13:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
fixed_packages
0
url pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/xwayland@22.1.6-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community
aliases CVE-2022-46343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxsy-k3cg-mkdd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/xwayland@22.1.6-r0%3Farch=armhf&distroversion=v3.18&reponame=community