Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/36645?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36645?format=api", "vulnerability_id": "VCID-k4dy-pv3f-4qas", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "aliases": [ { "alias": "CVE-2022-30629" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/434505?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=x86&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434500?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=aarch64&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=aarch64&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434501?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=armhf&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armhf&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434504?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=s390x&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=s390x&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434503?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=ppc64le&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434506?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=x86_64&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86_64&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/434502?format=api", "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=armv7&distroversion=v3.16&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armv7&distroversion=v3.16&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/74527?format=api", "purl": "pkg:ebuild/dev-lang/go@1.18.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/go@1.18.5" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/97506?format=api", "purl": "pkg:rpm/redhat/buildah@1:1.29.1-1?arch=el9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kkq-5jpf-fqev" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-1%3Farch=el9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98442?format=api", "purl": "pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/97510?format=api", "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1?arch=el9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kkq-5jpf-fqev" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1%3Farch=el9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98435?format=api", "purl": "pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98436?format=api", "purl": "pkg:rpm/redhat/cri-tools@1.24.2-6?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.24.2-6%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/97495?format=api", "purl": "pkg:rpm/redhat/etcd@3.3.23-12?arch=el8ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1rsj-pm1p-qbd6" }, { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5kkq-5jpf-fqev" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-65mk-w8rx-zucs" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-azr4-u36f-pbew" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-rtb8-bayb-dfbn" }, { "vulnerability": "VCID-tn6y-xfkz-83e4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.3.23-12%3Farch=el8ost" }, { "url": "http://public2.vulnerablecode.io/api/packages/98151?format=api", "purl": "pkg:rpm/redhat/golang@1.17.12-1?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5c67-zpsw-cyb2" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-86mk-kwg6-63h6" }, { "vulnerability": "VCID-as38-uuy9-5qhu" }, { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-mnxk-x51q-wkfp" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-vxks-1bkp-6bd5" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.17.12-1%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/98441?format=api", "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-mnxk-x51q-wkfp" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset@1.17.12-1%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/98437?format=api", "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.12-1?arch=el7_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17@1.17.12-1%3Farch=el7_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98139?format=api", "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1?arch=el7_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5c67-zpsw-cyb2" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-86mk-kwg6-63h6" }, { "vulnerability": "VCID-as38-uuy9-5qhu" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-vxks-1bkp-6bd5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1%3Farch=el7_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98434?format=api", "purl": "pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98149?format=api", "purl": "pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dh6-y93r-2ucc" }, { "vulnerability": "VCID-2zj9-xmsh-xbcn" }, { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5c67-zpsw-cyb2" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-86mk-kwg6-63h6" }, { "vulnerability": "VCID-as38-uuy9-5qhu" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-vxks-1bkp-6bd5" }, { "vulnerability": "VCID-w53f-uad6-gqdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98150?format=api", "purl": "pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dh6-y93r-2ucc" }, { "vulnerability": "VCID-2zj9-xmsh-xbcn" }, { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5c67-zpsw-cyb2" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-86mk-kwg6-63h6" }, { "vulnerability": "VCID-as38-uuy9-5qhu" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-vxks-1bkp-6bd5" }, { "vulnerability": "VCID-w53f-uad6-gqdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/98152?format=api", "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-498g-zap2-vqag" }, { "vulnerability": "VCID-5c67-zpsw-cyb2" }, { "vulnerability": "VCID-6189-d1tw-bfcp" }, { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-81aw-mk9s-eydd" }, { "vulnerability": "VCID-86mk-kwg6-63h6" }, { "vulnerability": "VCID-as38-uuy9-5qhu" }, { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-f5qg-jth9-hycf" }, { "vulnerability": "VCID-g8y7-jdy7-afdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-ps89-8u5a-kfc8" }, { "vulnerability": "VCID-vxks-1bkp-6bd5" }, { "vulnerability": "VCID-wqqa-tzs4-kugj" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/96229?format=api", "purl": "pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a473-9skg-tkbn" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/97512?format=api", "purl": "pkg:rpm/redhat/podman@2:4.4.1-3?arch=el9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kkq-5jpf-fqev" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-3%3Farch=el9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98439?format=api", "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7e1n-pvrt-g3fy" }, { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.1.5-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98440?format=api", "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-mnxk-x51q-wkfp" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-operator@2.1.5-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98334?format=api", "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-kexn-gjxj-uudm" }, { "vulnerability": "VCID-mnxk-x51q-wkfp" }, { "vulnerability": "VCID-ptd4-8f7f-hyg6" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98433?format=api", "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-proxy@2.1.5-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98438?format=api", "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dsm8-ck8e-wfdh" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/96223?format=api", "purl": "pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a473-9skg-tkbn" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" }, { "vulnerability": "VCID-yzsx-6acm-kkb6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/97514?format=api", "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-0.1?arch=el9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kkq-5jpf-fqev" }, { "vulnerability": "VCID-k4dy-pv3f-4qas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-0.1%3Farch=el9" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20385", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20373", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20248", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20244", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2021", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20122", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20197", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20282", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20246", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20711", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20797", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793", "reference_id": "2092793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "reference_url": "https://go.dev/cl/405994", "reference_id": "405994", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/" } ], "url": "https://go.dev/cl/405994" }, { "reference_url": "https://go.dev/issue/52814", "reference_id": "52814", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/" } ], "url": "https://go.dev/issue/52814" }, { "reference_url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5", "reference_id": "fe4de36198794c447fbd9d7cc2d7199a506c76a5", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/" } ], "url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0531", "reference_id": "GO-2022-0531", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0531" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ", "reference_id": "IWz5T6x7AAAJ", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5775", "reference_id": "RHSA-2022:5775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5799", "reference_id": "RHSA-2022:5799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5866", "reference_id": "RHSA-2022:5866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6040", "reference_id": "RHSA-2022:6040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6040" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6042", "reference_id": "RHSA-2022:6042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6102", "reference_id": "RHSA-2022:6102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6103", "reference_id": "RHSA-2022:6103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6152", "reference_id": "RHSA-2022:6152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6277", "reference_id": "RHSA-2022:6277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6290", "reference_id": "RHSA-2022:6290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6430", "reference_id": "RHSA-2022:6430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6535", "reference_id": "RHSA-2022:6535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9047", "reference_id": "RHSA-2022:9047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407", "reference_id": "RHSA-2023:0407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1275", "reference_id": "RHSA-2023:1275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529", "reference_id": "RHSA-2023:1529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2253", "reference_id": "RHSA-2023:2253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2282", "reference_id": "RHSA-2023:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2283", "reference_id": "RHSA-2023:2283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2367", "reference_id": "RHSA-2023:2367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2758", "reference_id": "RHSA-2023:2758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3642", "reference_id": "RHSA-2023:3642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3914", "reference_id": "RHSA-2023:3914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4488", "reference_id": "RHSA-2023:4488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4488" }, { "reference_url": "https://usn.ubuntu.com/6038-1/", "reference_id": "USN-6038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6038-1/" }, { "reference_url": "https://usn.ubuntu.com/6038-2/", "reference_id": "USN-6038-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6038-2/" } ], "weaknesses": [ { "cwe_id": 331, "name": "Insufficient Entropy", "description": "The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others." }, { "cwe_id": 200, "name": "Exposure of Sensitive Information to an Unauthorized Actor", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information." } ], "exploits": [], "severity_range_score": "3.1 - 3.7", "exploitability": "0.5", "weighted_severity": "2.8", "risk_score": 1.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4dy-pv3f-4qas" }