Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
Typeapk
Namespacealpine
Namelibxpm
Version3.5.15-r0
Qualifiers
arch aarch64
distroversion edge
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.5.17-r0
Latest_non_vulnerable_version3.5.19-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-n7q9-a364-6uc2
vulnerability_id VCID-n7q9-a364-6uc2
summary
Loop with Unreachable Exit Condition ('Infinite Loop')
A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44617.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44617
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22297
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21964
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-04T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22126
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-08T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22263
published_at 2026-04-09T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22282
published_at 2026-04-11T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.2224
published_at 2026-04-12T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.2218
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-18T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22129
published_at 2026-04-21T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.2199
published_at 2026-04-24T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.21977
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44617
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160193
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:01:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2160193
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:01:52Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28
6
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:01:52Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:01:52Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
8
reference_url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:01:52Z/
url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-44617
reference_id CVE-2022-44617
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-44617
10
reference_url https://security.gentoo.org/glsa/202408-03
reference_id GLSA-202408-03
reference_type
scores
url https://security.gentoo.org/glsa/202408-03
11
reference_url https://access.redhat.com/errata/RHSA-2023:0378
reference_id RHSA-2023:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0378
12
reference_url https://access.redhat.com/errata/RHSA-2023:0379
reference_id RHSA-2023:0379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0379
13
reference_url https://access.redhat.com/errata/RHSA-2023:0380
reference_id RHSA-2023:0380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0380
14
reference_url https://access.redhat.com/errata/RHSA-2023:0381
reference_id RHSA-2023:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0381
15
reference_url https://access.redhat.com/errata/RHSA-2023:0382
reference_id RHSA-2023:0382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0382
16
reference_url https://access.redhat.com/errata/RHSA-2023:0383
reference_id RHSA-2023:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0383
17
reference_url https://access.redhat.com/errata/RHSA-2023:0384
reference_id RHSA-2023:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0384
18
reference_url https://usn.ubuntu.com/5807-1/
reference_id USN-5807-1
reference_type
scores
url https://usn.ubuntu.com/5807-1/
19
reference_url https://usn.ubuntu.com/5807-2/
reference_id USN-5807-2
reference_type
scores
url https://usn.ubuntu.com/5807-2/
fixed_packages
0
url pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
purl pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxpm@3.5.15-r0%3Farch=aarch64&distroversion=edge&reponame=main
aliases CVE-2022-44617
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7q9-a364-6uc2
1
url VCID-r9ag-ykhs-h3cz
vulnerability_id VCID-r9ag-ykhs-h3cz
summary
Loop with Unreachable Exit Condition ('Infinite Loop')
A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46285.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46285
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28336
published_at 2026-04-02T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.27858
published_at 2026-04-29T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28379
published_at 2026-04-04T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28169
published_at 2026-04-07T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28234
published_at 2026-04-08T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28277
published_at 2026-04-09T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28282
published_at 2026-04-11T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28238
published_at 2026-04-12T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.2818
published_at 2026-04-13T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28193
published_at 2026-04-16T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28176
published_at 2026-04-18T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.2813
published_at 2026-04-21T12:55:00Z
12
value 0.00103
scoring_system epss
scoring_elements 0.28047
published_at 2026-04-24T12:55:00Z
13
value 0.00103
scoring_system epss
scoring_elements 0.27935
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46285
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160092
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2160092
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/a3a7c6dcc3b629d7650148
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/a3a7c6dcc3b629d7650148
6
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
8
reference_url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
9
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/1
10
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/10
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T14:43:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/10
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-46285
reference_id CVE-2022-46285
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-46285
12
reference_url https://security.gentoo.org/glsa/202408-03
reference_id GLSA-202408-03
reference_type
scores
url https://security.gentoo.org/glsa/202408-03
13
reference_url https://access.redhat.com/errata/RHSA-2023:0378
reference_id RHSA-2023:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0378
14
reference_url https://access.redhat.com/errata/RHSA-2023:0379
reference_id RHSA-2023:0379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0379
15
reference_url https://access.redhat.com/errata/RHSA-2023:0380
reference_id RHSA-2023:0380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0380
16
reference_url https://access.redhat.com/errata/RHSA-2023:0381
reference_id RHSA-2023:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0381
17
reference_url https://access.redhat.com/errata/RHSA-2023:0382
reference_id RHSA-2023:0382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0382
18
reference_url https://access.redhat.com/errata/RHSA-2023:0383
reference_id RHSA-2023:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0383
19
reference_url https://access.redhat.com/errata/RHSA-2023:0384
reference_id RHSA-2023:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0384
20
reference_url https://usn.ubuntu.com/5807-1/
reference_id USN-5807-1
reference_type
scores
url https://usn.ubuntu.com/5807-1/
21
reference_url https://usn.ubuntu.com/5807-2/
reference_id USN-5807-2
reference_type
scores
url https://usn.ubuntu.com/5807-2/
22
reference_url https://usn.ubuntu.com/5807-3/
reference_id USN-5807-3
reference_type
scores
url https://usn.ubuntu.com/5807-3/
fixed_packages
0
url pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
purl pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxpm@3.5.15-r0%3Farch=aarch64&distroversion=edge&reponame=main
aliases CVE-2022-46285
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9ag-ykhs-h3cz
2
url VCID-xq3s-t6bh-pydz
vulnerability_id VCID-xq3s-t6bh-pydz
summary
Untrusted Search Path
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4883.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4883
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40146
published_at 2026-04-08T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39785
published_at 2026-04-29T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40172
published_at 2026-04-04T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40093
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40159
published_at 2026-04-09T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40169
published_at 2026-04-11T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40131
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40112
published_at 2026-04-13T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40162
published_at 2026-04-16T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40132
published_at 2026-04-18T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40053
published_at 2026-04-21T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-24T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.39866
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4883
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160213
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-20T19:44:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2160213
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff91669
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-20T19:44:09Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff91669
6
reference_url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-20T19:44:09Z/
url https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-20T19:44:09Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html
8
reference_url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-20T19:44:09Z/
url https://lists.x.org/archives/xorg-announce/2023-January/003312.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-4883
reference_id CVE-2022-4883
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-4883
10
reference_url https://security.gentoo.org/glsa/202408-03
reference_id GLSA-202408-03
reference_type
scores
url https://security.gentoo.org/glsa/202408-03
11
reference_url https://access.redhat.com/errata/RHSA-2023:0377
reference_id RHSA-2023:0377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0377
12
reference_url https://access.redhat.com/errata/RHSA-2023:0378
reference_id RHSA-2023:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0378
13
reference_url https://access.redhat.com/errata/RHSA-2023:0379
reference_id RHSA-2023:0379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0379
14
reference_url https://access.redhat.com/errata/RHSA-2023:0380
reference_id RHSA-2023:0380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0380
15
reference_url https://access.redhat.com/errata/RHSA-2023:0381
reference_id RHSA-2023:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0381
16
reference_url https://access.redhat.com/errata/RHSA-2023:0382
reference_id RHSA-2023:0382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0382
17
reference_url https://access.redhat.com/errata/RHSA-2023:0383
reference_id RHSA-2023:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0383
18
reference_url https://access.redhat.com/errata/RHSA-2023:0384
reference_id RHSA-2023:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0384
19
reference_url https://usn.ubuntu.com/5807-1/
reference_id USN-5807-1
reference_type
scores
url https://usn.ubuntu.com/5807-1/
20
reference_url https://usn.ubuntu.com/5807-2/
reference_id USN-5807-2
reference_type
scores
url https://usn.ubuntu.com/5807-2/
fixed_packages
0
url pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
purl pkg:apk/alpine/libxpm@3.5.15-r0?arch=aarch64&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxpm@3.5.15-r0%3Farch=aarch64&distroversion=edge&reponame=main
aliases CVE-2022-4883
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq3s-t6bh-pydz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxpm@3.5.15-r0%3Farch=aarch64&distroversion=edge&reponame=main